Resum
A new method is presented which enables key exchange without any previous secret agreement; a variant of it yields a signature scheme. This method requires less interactive computation then usual public key protocols, and also provides secrecy and authentication, so that its implementation is very attractive from a cost point of view. © 1990.
| Idioma original | Anglès |
|---|---|
| Pàgines (de-a) | 145-152 |
| Revista | Computers and Security |
| Volum | 9 |
| Número | 2 |
| DOIs | |
| Estat de la publicació | Publicada - 1 de gen. 1990 |