SIGN IN
SIGN UP
Password authenticated key exchange using hidden smooth subgroups
Full Text:
PDF
Get this Article
Authors:
Craig Gentry
DoCoMo USA Labs, San Jose, CA
Philip Mackenzie
DoCoMo USA Labs, San Jose, CA
Zulfikar Ramzan
DoCoMo USA Labs, San Jose, CA
Published in:
· Proceeding
CCS '05
Proceedings of the 12th ACM conference on Computer and communications security
Pages 299-309
ACM
New York, NY
, USA
©2005
table of contents
ISBN:1-59593-226-7
doi>
10.1145/1102120.1102160
2005 Article
Bibliometrics
· Downloads (6 Weeks): 0
· Downloads (12 Months): 20
· Downloads (cumulative): 930
· Citation Count: 15
Tools and Resources
Buy this Article
Recommend the ACM DL
to your organization
Request Permissions
TOC Service:
Email
RSS
Save to Binder
Export Formats:
BibTeX
EndNote
ACM Ref
Upcoming Conference:
CCS'16
Share:
|
Author Tags
authentication
cryptography
key exchange
network protocols
password
public key (asymmetric) techniques
public key encryption
security
Contact Us
|
Switch to
single page view
(no tabs)
**Javascript is not enabled and is required for the "tabbed view" or switch to the
single page view
**
Advertisements
Powered by
Did you know the ACM DL App is now available?
Did you know your Organization can subscribe to the ACM Digital Library?
The ACM Guide to Computing Literature
All Tags
Export Formats
Save to Binder