Protocols for authentification and key establishment

From MaRDI portal
Publication:1872784


zbMath1043.68014MaRDI QIDQ1872784

Colin A. Boyd, Anish Mathuria

Publication date: 15 May 2003

Published in: Information Security and Cryptography (Search for Journal in Brave)


68-01: Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science

94A60: Cryptography

68M12: Network protocols

94A62: Authentication, digital signatures and secret sharing

94-01: Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory


Related Items

Post-Quantum Constant-Round Group Key Exchange from Static Assumptions, A Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs, A New Anonymous Password-Based Authenticated Key Exchange Protocol, The "Elliptic" matrices and a new kind of cryptography, Authenticated commutator key agreement protocol, Signal-flow-based analysis of wireless security protocols, A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols, Distributed temporal logic for the analysis of security protocol models, Provably secure identity-based authenticated key agreement protocols with malicious private key generators, On integrating confidentiality and functionality in a formal method, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, FORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes, Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography, An improved identity-based key agreement protocol and its security proof, Authenticated confidential channel establishment and the security of TLS-DHE, Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing, Invariant-based reasoning about parameterized security protocols, Protocol Composition Logic (PCL), Structural Vulnerability and Robustness in Complex Networks: Different Approaches and Relationships Between them, Remote IP Protection Using Timing Channels, Robust biometric-based three-party authenticated key establishment protocols, Key Establishment Using Signcryption Techniques, An algebraic approach to the verification of a class of Diffie-Hellman protocols, Trust-Rated Authentication for Domain-Structured Distributed Systems, Provably secure key establishment protocol using one-way functions, On Establishing and Fixing a Parallel Session Attack in a Security Protocol, Towards Denial-of-Service-Resilient Key Agreement Protocols