Patra, Arpita; Choudhury, Ashish; Rangan, C. Pandu; Srinathan, Kannan Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. (English) Zbl 1208.94051 Int. J. Appl. Cryptogr. 2, No. 2, 159-197 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Patra} et al., Int. J. Appl. Cryptogr. 2, No. 2, 159--197 (2010; Zbl 1208.94051) Full Text: DOI
Menezes, Alfred; Ustaoglu, Berkant On reusing ephemeral keys in Diffie-Hellman key agreement protocols. (English) Zbl 1208.94050 Int. J. Appl. Cryptogr. 2, No. 2, 154-158 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{A. Menezes} and \textit{B. Ustaoglu}, Int. J. Appl. Cryptogr. 2, No. 2, 154--158 (2010; Zbl 1208.94050) Full Text: DOI
Hong, Jeongdae; Kim, Jinil; Kim, Jihye; Franklin, Matthew K.; Park, Kunsoo Fair threshold decryption with semi-trusted third parties. (English) Zbl 1208.94046 Int. J. Appl. Cryptogr. 2, No. 2, 139-153 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Hong} et al., Int. J. Appl. Cryptogr. 2, No. 2, 139--153 (2010; Zbl 1208.94046) Full Text: DOI
Prouff, E.; Rivain, M. Theoretical and practical aspects of mutual information-based side channel analysis. (English) Zbl 1208.94052 Int. J. Appl. Cryptogr. 2, No. 2, 121-138 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{E. Prouff} and \textit{M. Rivain}, Int. J. Appl. Cryptogr. 2, No. 2, 121--138 (2010; Zbl 1208.94052) Full Text: DOI
Goldberg, Ian; Mashatan, Atefeh; Stinson, Douglas R. On message recognition protocols: recoverability and explicit confirmation. (English) Zbl 1208.94044 Int. J. Appl. Cryptogr. 2, No. 2, 100-120 (2010). MSC: 94A60 PDF BibTeX XML Cite \textit{I. Goldberg} et al., Int. J. Appl. Cryptogr. 2, No. 2, 100--120 (2010; Zbl 1208.94044) Full Text: DOI
Cremers, Cas J. F. Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol. (English) Zbl 1210.94086 Int. J. Appl. Cryptogr. 2, No. 2, 83-99 (2010). Reviewer: Richard A. Mollin (Calgary) MSC: 94A60 PDF BibTeX XML Cite \textit{C. J. F. Cremers}, Int. J. Appl. Cryptogr. 2, No. 2, 83--99 (2010; Zbl 1210.94086) Full Text: DOI