Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
From MaRDI portal
Publication:2803662
DOI10.1007/978-3-662-49301-4_32zbMATH Open1405.94101OpenAlexW2505227617MaRDI QIDQ2803662FDOQ2803662
Authors: Jean-Sébastien Coron
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_32
Recommendations
- Analysis of security protocols based on challenge-response
- scientific article; zbMATH DE number 1775427
- scientific article; zbMATH DE number 1722690
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- scientific article; zbMATH DE number 2143936
Cites Work
Cited In (3)
Uses Software
This page was built for publication: Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803662)