Sciweavers

2 search results - page 1 / 1
» An Extension to Bellare and Rogaway (1993) Model: Resetting ...
Sort
View
ACISP
2006
Springer
13 years 9 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
CJ
2007
106views more  CJ 2007»
13 years 5 months ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo