Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
19
views
18
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,904
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — CRYPTO ’85 Proceedings
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
other
Author(s):
Yvo Desmedt
Publication date
(Online):
December 1 2000
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
18
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1048
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A method for obtaining digital signatures and public-key cryptosystems
R. L. Rivest
,
A Shamir
,
L Adleman
(1978)
0
comments
Cited
390
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
New directions in cryptography
W. Diffie
,
Chan Hellman
(1976)
0
comments
Cited
336
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Pages
: 42-55
DOI:
10.1007/3-540-39799-X_6
SO-VID:
deda134e-9fda-445d-bc19-6fe0579e7a4c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 42
Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
pp. 58
On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract)
pp. 18
Attacks on Some RSA Signatures
pp. 280
On the Security of DES
pp. 87
A Framework for the Study of Cryptographic Protocols
pp. 192
Cryptanalysis of des with a Reduced Number of Rounds
pp. 340
Analysis of a Public Key Approach Based on Polynomial Substitution
pp. 403
N Using RSA with Low Exponent in a Public Key Network
pp. 417
Use of Elliptic Curves in Cryptography
pp. 429
Cryptography with Cellular Automata
pp. 468
How to Reduce your Enemy’s Information (extended abstract)
pp. 523
On the Design of S-Boxes
Similar content
1,904
A note on unconditionally stable linear multistep methods
Authors:
Olof B. Widlund
Contextual conditioning with massed versus distributed unconditional stimuli in the absence of explicit conditional stimuli.
Authors:
Michael S. Fanselow
,
Thomas Tighe
Increased extracellular dopamine in nucleus accumbens in response to unconditioned and conditioned aversive stimuli: studies using 1 min microdialysis in rats.
Authors:
Andrew M J Young
See all similar
Cited by
5
Bucket Hashing and its Application to Fast Message Authentication
Authors:
Phillip Rogaway
Strong Conditional Oblivious Transfer and Computing on Intervals
Authors:
Ian F. Blake
,
Vladimir Kolesnikov
Towards Quantum-Secured Permissioned Blockchain: Signature, Consensus, and Logic
Authors:
Xin Sun
,
Mirek Sopek
,
Quanlong Wang
…
See all cited by