Protocols for authentification and key establishment
confidentialitynumber theorypublic key cryptographysecret sharingforward secrecycryptographic algorithmsdata integrityfreshnesskey agreement protocolsunknown key-share attackskey compromise impersonationattack on protocolscertificate manipulationconference key protocolsdata origin authenticationkey broadcastingkey establishment protocolskey transport protocolspassword-based protocolsprotocol architecturesprotocols for authenticationserver-based key establishmentshared key cryptography
Cryptography (94A60) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory (94-01) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
- Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Robust biometric-based three-party authenticated key establishment protocols
- Security flaws in authentication and key establishment protocols for mobile communications
- Remote IP protection using timing channels
- scientific article; zbMATH DE number 2090928 (Why is no real title available?)
- Provably secure key establishment protocol using one-way functions
- scientific article; zbMATH DE number 1844567 (Why is no real title available?)
- Authenticated confidential channel establishment and the security of TLS-DHE
- Distributed temporal logic for the analysis of security protocol models
- A New Anonymous Password-Based Authenticated Key Exchange Protocol
- Progress in Cryptology - INDOCRYPT 2004
- The "Elliptic" matrices and a new kind of cryptography
- scientific article; zbMATH DE number 2077190 (Why is no real title available?)
- Towards Denial-of-Service-Resilient Key Agreement Protocols
- Protocols for authentication and key establishment
- A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Provably secure identity-based authenticated key agreement protocols with malicious private key generators
- An improved identity-based key agreement protocol and its security proof
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- On strengthening authentication protocols to foil cryptanalysis
- scientific article; zbMATH DE number 1962757 (Why is no real title available?)
- scientific article; zbMATH DE number 2080179 (Why is no real title available?)
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- On integrating confidentiality and functionality in a formal method
- Trust-Rated Authentication for Domain-Structured Distributed Systems
- Efficient network authentication protocols: lower bounds and optimal implementations
- An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
- Invariant-based reasoning about parameterized security protocols
- Foundations of Security Analysis and Design II
- An algebraic approach to the verification of a class of Diffie-Hellman protocols
- Authenticated commutator key agreement protocol
- Secure key establishment
- Key Exchange
- Protocol composition logic (PCL)
- On the cryptographic protocol of WAP WTLS
- scientific article; zbMATH DE number 1189394 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- Alternative security models for a pseudorandom function
- scientific article; zbMATH DE number 1759361 (Why is no real title available?)
- Key Establishment Using Signcryption Techniques
- FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes
- scientific article; zbMATH DE number 924956 (Why is no real title available?)
- A Family of Collusion Resistant Symmetric Key Protocols for Authentication
- A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
- A brief history of security protocols
- Security protocols and their properties
- Signal-flow-based analysis of wireless security protocols
- Structural vulnerability and robustness in complex networks: different approaches and relationships between them
- Several practical protocols for authentication and key exchange
- Cryptographic protocol. Security analysis based on trusted freshness.
This page was built for publication: Protocols for authentification and key establishment
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1872784)