Security Analysis of the PACE Key-Agreement Protocol
From MaRDI portal
Publication:3399198
DOI10.1007/978-3-642-04474-8_3zbMath1307.94036OpenAlexW1489575369MaRDI QIDQ3399198
Jens Bender, Dennis Kügler, Marc Fischlin
Publication date: 29 September 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-04474-8_3
Related Items (6)
Stand-by Attacks on E-ID Password Authentication ⋮ Zero round-trip time for the extended access control protocol ⋮ Security Analysis of CPace ⋮ Unnamed Item ⋮ Security and Trust in Sensor Networks ⋮ The ``Quantum annoying property of password-authenticated key exchange protocols
Cites Work
- Unnamed Item
- Unnamed Item
- How to Hash into Elliptic Curves
- A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- Topics in Cryptology – CT-RSA 2005
- Public Key Cryptography - PKC 2005
- Financial Cryptography and Data Security
- Algorithmic Number Theory
This page was built for publication: Security Analysis of the PACE Key-Agreement Protocol