Entry Cremers:2010:SSS from ijact.bib
Last update: Sun Jan 6 02:01:01 MST 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
Y |
Z
BibTeX entry
@Article{Cremers:2010:SSS,
author = "Cas J. F. Cremers",
title = "{Session-StateReveal} is stronger than {eCKs}
{EphemeralKeyReveal}: using automatic analysis to
attack the {NAXOS} protocol",
journal = j-INT-J-APPL-CRYPTOGR,
volume = "2",
number = "2",
pages = "83--99",
year = "2010",
CODEN = "????",
DOI = "https://doi.org/10.1504/IJACT.2010.038304",
ISSN = "1753-0563 (print), 1753-0571 (electronic)",
ISSN-L = "1753-0563",
MRclass = "94A62 (94A60)",
MRnumber = "2760158",
bibdate = "Fri Mar 17 10:02:54 2017",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ijact.bib",
acknowledgement = ack-nhfb,
fjournal = "International Journal of Applied Cryptography. IJACT",
journal-URL = "http://www.inderscienceonline.com/loi/ijact",
}
Related entries
- 94A60,
1(1)3,
1(1)22,
1(1)32,
1(2)91,
1(2)108,
1(2)144,
1(3)161,
1(4)264,
2(2)121,
2(2)139,
2(2)154,
2(3)199,
2(3)212,
2(3)229,
2(3)250,
2(3)271,
2(4)289,
2(4)304,
2(4)322,
2(4)360,
3(1)1,
3(1)21,
3(1)47,
3(1)84,
3(2)116,
3(2)139,
3(2)148,
3(2)166,
3(2)181
- 94A62,
1(1)47,
1(1)60,
1(1)70,
1(2)79,
1(2)120,
1(2)133,
1(4)290,
2(1)35,
2(1)46,
2(2)100,
2(2)121,
2(2)159,
2(4)289
- analysis,
1(2)144,
1(3)169,
1(4)320,
2(2)121,
3(2)97
- attack,
1(1)32,
1(2)91,
1(3)161,
2(1)13,
2(1)23,
3(2)97,
3(2)181,
3(3)225,
3(4)377
- protocol,
1(1)70,
1(2)144,
1(4)290,
2(2)100,
2(2)154,
2(4)360,
3(3)236,
3(4)377
- using,
2(3)212,
3(3)225