Список литературы к разделу Стойкость криптосхем после компрометации ключей

From CryptoWiki
Jump to: navigation, search


1 - Entity Authentication and Key Distribution

Mihir Bellare and Phillip Rogaway. “Entity Authentication and Key Distribution”. In: Advances in Cryptology – CRYPTO ’93. LNCS 773. Springer Berlin Heidelberg, Jan. 1, 1994, pp. 232–249. DOI: 10.1007/3-540-48329-2 21. [1]

2 - On Post-Compromise Security

K. Cohn-Gordon, C. Cremers, L. Garratt, "On post-compromise security", IEEE ComputerSecurity Foundations Symposium (CSF), pp. 164-178, 2016. [2]

3 - Decim: Detecting endpoint compromise in messaging

J. Yu, M. Ryan, C. Cremers, "Decim: Detecting endpoint compromise in messaging", IACR Cryptology ePrint Archive, vol. 2015, pp. 486, 2015. [3]

На главную страницу раздела