Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
From MaRDI portal
Publication:2803662
Recommendations
- Analysis of security protocols based on challenge-response
- scientific article; zbMATH DE number 1775427
- scientific article; zbMATH DE number 1722690
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- scientific article; zbMATH DE number 2143936
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1942418 (Why is no real title available?)
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Probabilistic encryption
- Stronger Security of Authenticated Key Exchange
Cited in
(3)
This page was built for publication: Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803662)