2002 | ||
---|---|---|
3 | EE | Anna M. Johnston, Peter Gemmell: Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack. J. Cryptology 15(2): 139-148 (2002) |
1999 | ||
2 | Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann: On the Cryptographic Value of The qth Root Problem. ICICS 1999: 135-142 | |
1 | EE | Anna M. Johnston: A Generalized qth Root Algorithm. SODA 1999: 929-930 |
1 | Cheryl L. Beaver | [2] |
2 | Peter Gemmell | [2] [3] |
3 | William D. Neumann | [2] |