The security of lazy users in out-of-band authentication
From MaRDI portal
Publication:1631350
DOI10.1007/978-3-030-03810-6_21zbMath1430.94093OpenAlexW2898879311MaRDI QIDQ1631350
Moni Naor, Gil Segev, Lior Rotem
Publication date: 6 December 2018
Full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_21
Related Items (1)
Cites Work
- The security of lazy users in out-of-band authentication
- Out-of-band authentication in group messaging: computational, statistical, optimal
- Ratcheted encryption and key exchange: the security of messaging
- A formal security analysis of the Signal messaging protocol
- Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions
- Adaptive One-Way Functions and Applications
- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
- New and Improved Constructions of Nonmalleable Cryptographic Protocols
- An attack on the Interlock Protocol when used for authentication
- Foundations of Cryptography
- Nonmalleable Cryptography
- Non-malleability amplification
- Textbook non-malleable commitments
- Constant round non-malleable protocols using one way functions
- Constant-round non-malleable commitments from any one-way function
- Secure Communications over Insecure Channels Based on Short Authenticated Strings
- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
- Topics in Cryptology – CT-RSA 2006
This page was built for publication: The security of lazy users in out-of-band authentication