Using encryption for authentication in large networks of computers

From MaRDI portal
Publication:4168037

DOI10.1145/359657.359659zbMath0387.68003OpenAlexW2146973388WikidataQ55879611 ScholiaQ55879611MaRDI QIDQ4168037

Michael Schroeder, Roger M. Needham

Publication date: 1978

Published in: Communications of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/359657.359659




Related Items (only showing first 100 items - show all)

Certifying choreography compilationSecrecy types for asymmetric communication.Three systems for cryptographic protocol analysisPrivate authenticationA probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsArbitrated unconditionally secure authentication scheme with multi-sendersAn approach for formal verification of authentication protocolsModel Checking Security ProtocolsFirst-order temporal verification in practiceValidation of Decentralised Smart Contracts Through Game Theory and Formal MethodsSymbolic Protocol Analysis with Disequality Constraints Modulo Equational TheoriesA tutorial-style introduction to \(\mathsf{DY}^{\star}\)Joshua Guttman: pioneering strand spacesAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsInformation theoretically secure key sharing protocol executing with constant noiseless public channelsFormal analysis of Kerberos 5Injective synchronisation: An extension of the authentication hierarchyA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesA (restricted) quantifier elimination for security protocolsAttacking group protocols by refuting incorrect inductive conjecturesBounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresA collusion problem and its solutionA game-theoretic framework for specification and verification of cryptographic protocolsProtocol Verification Via Rigid/Flexible ResolutionUnnamed ItemFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesTo know or not to know: Epistemic approaches to security protocol verificationExtended KCI attack against two-party key establishment protocolsUniversally composable symbolic security analysisA matrix key-distribution schemeThe IITM model: a simple and expressive model for universal composabilityThe meeting businessmen problem: requirements and limitationsBounded memory Dolev-Yao adversaries in collaborative systemsEfficient network authentication protocols: Lower bounds and optimal implementationsCelf – A Logical Framework for Deductive and Concurrent Systems (System Description)Computation of discrete logarithms in prime fieldsAutomated type-based analysis of injective agreement in the presence of compromised principalsAn attack on the Needham-Schroeder public-key authentication protocolOn the security of SPLICE/AS -- The authentication system in WIDE InternetTheorem Proving Based on Proof Scores for Rewrite Theory Specifications of OTSsProvably secure key establishment protocol using one-way functionsEnhancing the security of password authenticated key agreement protocols based on chaotic mapsA Maude environment for CafeOBJAttacks on Okamoto and Tanaka's one-way ID-based key distribution systemKey Compromise, Strand Spaces, and the Authentication Tests1 1I gave my MFPS 17 talk on 24 May 2001, Bob Dylan's sixtieth birthday. This paper is dedicated to him.A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic ProtocolsModeling and Verifying Time Sensitive Security Protocols with ConstraintsCryptographic logical relationsSymbolic protocol analysis for monoidal equational theoriesBreaking and fixing public-key KerberosA framework for compositional verification of security protocolsUnnamed ItemAbstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automaticallyTyped Multiset Rewriting Specifications of Security ProtocolsA core model for choreographic programmingDistributed temporal logic for the analysis of security protocol modelsVerification of cryptographic protocols: tagging enforces terminationAn NP decision procedure for protocol insecurity with XORSimulation relations for alternating Büchi automataTwo phases encryption and its applicationsInvariant-based reasoning about parameterized security protocolsA new password authentication mechanism based on two phases encryptionAutomatic verification of temporal-epistemic properties of cryptographic protocolsUnnamed ItemCompiling and securing cryptographic protocolsPassword-based authentication and key distribution protocols with perfect forward secrecyRelating state-based and process-based concurrency through linear logic (full-version)Safely Composing Security ProtocolsA countable and time-bound password-based user authentication scheme for the applications of electronic commercePing-pong protocols as prefix grammars: modelling and verification via program transformationPractical uses of synchronized clocks in distributed systemsОбзор уязвимостей некоторых протоколов выработки общего ключа с аутентификацией на основе пароля и принципы построения протокола SESPAKEComputational Semantics for First-Order Logical Analysis of Cryptographic ProtocolsComparing State Spaces in Automatic Security Protocol AnalysisA ramp model for distributed key distribution schemesCombining proverif and automated theorem provers for security protocol verificationPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessCryptographic Verification by Typing for a Sample Protocol ImplementationCompleteness and Herbrand theorems for nominal logicPerfectly secure key distribution for dynamic conferencesSafely composing security protocolsAuthentication and delegation with smart-cardsEXPLOITING SYMMETRIES FOR TESTING EQUIVALENCE VERIFICATION IN THE SPI CALCULUSA calculus for cryptographic protocols: The spi calculusFormalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol ModelAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifBounded memory protocolsSecure implementation of channel abstractionsProtocol Composition Logic (PCL)Temporal Logics of Knowledge and their Applications in SecuritySkeletons, Homomorphisms, and Shapes: Characterizing Protocol ExecutionsScheme for secure digital mobile communications based on symmetric key cryptographyTheoretical Aspects of Communication-Centred ProgrammingModels and emerging trends of concurrent constraint programmingAuthentication tests and the structure of bundles.A remote password authentication scheme based on the digital signature methodNarrowing and Rewriting Logic: from Foundations to ApplicationsInter-protocol interleaving attacks on some authentication and key distribution protocolsAn iterative modular multiplication algorithmEqual To The Task?




This page was built for publication: Using encryption for authentication in large networks of computers