On strengthening authentication protocols to foil cryptanalysis
From MaRDI portal
Publication:826064
Recommendations
Cited in
(12)- The KryptoKnight family of protocols: Evaluation and enhancement
- Inter-protocol interleaving attacks on some authentication and key distribution protocols
- Key compromise, strand spaces, and the authentication tests
- Shared authentication token secure against replay and weak key attacks
- scientific article; zbMATH DE number 1962757 (Why is no real title available?)
- Computational Science and Its Applications – ICCSA 2004
- Authentication tests and the structure of bundles.
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
- Cryptographic defense against traffic analysis
- Impact factors involved in cryptoperiod computation in key compromise impersonation scenario
- New Kerberos protocol based on Weil pairing
- Breaking and fixing public-key Kerberos
This page was built for publication: On strengthening authentication protocols to foil cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q826064)