Alice and Bob

Results: 105



#Item
101MQV / Diffie–Hellman key exchange / Password Authenticated Key Exchange by Juggling / Key-agreement protocol / Public-key cryptography / Man-in-the-middle attack / Password-authenticated key agreement / Alice and Bob / XTR / Cryptography / Cryptographic protocols / YAK

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-03-11 17:53:38
102Applied mathematics / Distance-bounding protocol / IP / NEXPTIME / Formal verification / Alice and Bob / Public-key cryptography / Man-in-the-middle attack / Interactive proof system / Cryptography / Cryptographic protocols / Theoretical computer science

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-29 07:20:33
103Challenge-response authentication / Commitment scheme / IP / Zero-knowledge proof / Distance-bounding protocol / NP / Cryptographic nonce / Alice and Bob / Public-key cryptography / Cryptography / Cryptographic protocols / Complexity classes

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-07-23 09:02:44
104Oblivious transfer / RSA / Alice and Bob / XTR / Cryptography / Cryptographic protocols / Public-key cryptography

PDF Document

Add to Reading List

Source URL: ce.sharif.edu

Language: English - Date: 2011-07-28 11:31:09
UPDATE