Protocols for authentification and key establishment

From MaRDI portal
Publication:1872784

zbMath1043.68014MaRDI QIDQ1872784

Colin A. Boyd, Anish Mathuria

Publication date: 15 May 2003

Published in: Information Security and Cryptography (Search for Journal in Brave)




Related Items (28)

Structural Vulnerability and Robustness in Complex Networks: Different Approaches and Relationships Between themAuthenticated commutator key agreement protocolSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeRemote IP Protection Using Timing ChannelsSignal-flow-based analysis of wireless security protocolsAn efficient identity-based key exchange protocol with KGS forward secrecy for low-power devicesProvably secure identity-based authenticated key agreement protocols with malicious private key generatorsFORSAKES: a forward-secure authenticated key exchange protocol based on symmetric key-evolving schemesTrust-Rated Authentication for Domain-Structured Distributed SystemsThe "Elliptic" matrices and a new kind of cryptographyAuthenticated confidential channel establishment and the security of TLS-DHERobust biometric-based three-party authenticated key establishment protocolsKey Establishment Using Signcryption TechniquesProvably secure key establishment protocol using one-way functionsA mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocolsCryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptographyCryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testingDistributed temporal logic for the analysis of security protocol modelsInvariant-based reasoning about parameterized security protocolsOn Establishing and Fixing a Parallel Session Attack in a Security ProtocolOn integrating confidentiality and functionality in a formal methodAn improved identity-based key agreement protocol and its security proofPost-Quantum Constant-Round Group Key Exchange from Static AssumptionsTowards Denial-of-Service-Resilient Key Agreement ProtocolsA New Anonymous Password-Based Authenticated Key Exchange ProtocolProtocol Composition Logic (PCL)An algebraic approach to the verification of a class of Diffie-Hellman protocolsA Bird’s-Eye View of Modern Symmetric Cryptography from Combinatorial Designs




This page was built for publication: Protocols for authentification and key establishment