Feltz, Michèle; Cremers, Cas Strengthening the security of authenticated key exchange against bad randomness. (English) Zbl 1426.94096 Des. Codes Cryptography 86, No. 3, 481-516 (2018). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Feltz} and \textit{C. Cremers}, Des. Codes Cryptography 86, No. 3, 481--516 (2018; Zbl 1426.94096) Full Text: DOI Link
Cremers, Cas; Feltz, Michèle Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. (English) Zbl 1351.94038 Des. Codes Cryptography 74, No. 1, 183-218 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Cremers} and \textit{M. Feltz}, Des. Codes Cryptography 74, No. 1, 183--218 (2015; Zbl 1351.94038) Full Text: DOI
Boyd, Colin; Cremers, Cas; Feltz, Michèle; Paterson, Kenneth G.; Poettering, Bertram; Stebila, Douglas ASICS: Authenticated key exchange security incorporating certification systems. (English) Zbl 1443.94089 Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 381-399 (2013). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Boyd} et al., Lect. Notes Comput. Sci. 8134, 381--399 (2013; Zbl 1443.94089) Full Text: DOI Link
Feltz, Michèle On the Conjugacy Problem in Groups and its Variants. arXiv:1004.3588 Preprint, arXiv:1004.3588 [math.GR] (2010). MSC: 20F10 BibTeX Cite \textit{M. Feltz}, ``On the Conjugacy Problem in Groups and its Variants'', Preprint, arXiv:1004.3588 [math.GR] (2010) Full Text: arXiv OA License
Miller, G. Edward; Feltz, Carol J. Asymptotic inference for coefficients of variation. (English) Zbl 1030.62517 Commun. Stat., Theory Methods 26, No. 3, 715-726 (1997). MSC: 62F05 62F25 PDFBibTeX XMLCite \textit{G. E. Miller} and \textit{C. J. Feltz}, Commun. Stat., Theory Methods 26, No. 3, 715--726 (1997; Zbl 1030.62517) Full Text: DOI