Authenticated Key Distribution: When the Coupon Collector is Your Enemy
暂无分享,去创建一个
David Naccache | Peter Y. A. Ryan | Marc Beunardeau | Fatima-Ezzahra El Orche | Diana Maimut | Peter B. Rønne
[1] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[2] Marc Joye,et al. ID-based secret-key cryptography , 1998, OPSR.
[3] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[4] B. Eisenberg. On the expectation of the maximum of IID geometric random variables , 2008 .
[5] Babak Hassibi,et al. Delay Considerations for Opportunistic Scheduling in Broadcast Fading Channels , 2007, IEEE Transactions on Wireless Communications.
[6] Sébastien Canard,et al. IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography , 2019, IACR Cryptol. ePrint Arch..
[7] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.