On strengthening authentication protocols to foil cryptanalysis
From MaRDI portal
Publication:826064
DOI10.1007/3-540-58618-0_64zbMATH Open1481.94145OpenAlexW1494849574MaRDI QIDQ826064FDOQ826064
Authors: Wenbo Mao, Colin A. Boyd
Publication date: 20 December 2021
Full work available at URL: https://doi.org/10.1007/3-540-58618-0_64
Recommendations
encryption algorithmauthentication protocolauthentication mechanismentity authenticationremedy scheme
Cited In (12)
- The KryptoKnight family of protocols: Evaluation and enhancement
- Inter-protocol interleaving attacks on some authentication and key distribution protocols
- Key compromise, strand spaces, and the authentication tests
- Shared authentication token secure against replay and weak key attacks
- Title not available (Why is that?)
- Computational Science and Its Applications – ICCSA 2004
- Authentication tests and the structure of bundles.
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
- Cryptographic defense against traffic analysis
- Impact factors involved in cryptoperiod computation in key compromise impersonation scenario
- New Kerberos protocol based on Weil pairing
- Breaking and fixing public-key Kerberos
This page was built for publication: On strengthening authentication protocols to foil cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q826064)