Cryptology ePrint Archive: Report 2009/253
Available versions in chronological order
20090601:153307 (posted 01-Jun-2009 15:33:07 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
20090609:123533 (posted 09-Jun-2009 12:35:33 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
20090625:085917 (posted 25-Jun-2009 08:59:17 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
20090724:122516 (posted 24-Jul-2009 12:25:16 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
20090726:051423 (posted 26-Jul-2009 05:14:23 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
20090806:073545 (posted 06-Aug-2009 07:35:45 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
20100727:103626 (posted 27-Jul-2010 10:36:26 UTC)
Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange
Cas J.F. Cremers
[
Cryptology ePrint archive
]