Two attacks on Neuman-Stubblebine authentication protocols
From MaRDI portal
Publication:673822
DOI10.1016/0020-0190(95)00177-EzbMATH Open0875.68378MaRDI QIDQ673822FDOQ673822
Authors: Tzonelih Hwang, N. Y. Lee, Chuan-Ming Li, Ming-Yung Ko, Yung-Hsiang Chen
Publication date: 28 February 1997
Published in: Information Processing Letters (Search for Journal in Brave)
Recommendations
- An attack on the Needham-Schroeder public-key authentication protocol
- Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol
- Inter-protocol interleaving attacks on some authentication and key distribution protocols
- Fault Attacks on Pairing-Based Protocols: Revisited
- Information Security and Privacy
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- Fault attacks on nonce-based authenticated encryption: application to Keyak and Ketje
- Vulnerability of two multiple-key agreement protocols
- An attack on a recursive authentication protocol. A cautionary tale
Cited In (7)
- Beacon based authentication
- Inter-protocol interleaving attacks on some authentication and key distribution protocols
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- On the Clark-Jacob version of SPLICE/AS
- On the security of recent protocols
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- Authentication tests and the structure of bundles.
This page was built for publication: Two attacks on Neuman-Stubblebine authentication protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q673822)