Shared authentication token secure against replay and weak key attacks
From MaRDI portal
Recommendations
- Secure Authentication from a Weak Key, without Leaking Information
- Unconditionally-secure and reusable public-key authentication
- Efficient and secure authenticated key exchange using weak passwords
- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
- Anonymous authentication with shared secrets
- Tightly-secure authenticated key exchange, revisited
- Authenticated key exchange secure against dictionary attacks
- scientific article; zbMATH DE number 2077190
- On strengthening authentication protocols to foil cryptanalysis
Cited in
(4)
This page was built for publication: Shared authentication token secure against replay and weak key attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q287040)