Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
From MaRDI portal
Publication:5458285
Recommendations
- Man-in-the-middle secure authentication schemes from LPN and weak PRFs
- Shared authentication token secure against replay and weak key attacks
- A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
- scientific article; zbMATH DE number 1302852
- Keying hash functions for message authentication
Cited in
(2)
This page was built for publication: Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458285)