Secure Communications over Insecure Channels Based on Short Authenticated Strings
From MaRDI portal
Publication:5451033
DOI10.1007/11535218_19zbMath1145.94475OpenAlexW1572503422MaRDI QIDQ5451033
Publication date: 17 March 2008
Published in: Advances in Cryptology – CRYPTO 2005 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535218_19
Authentication, digital signatures and secret sharing (94A62) Communication theory (94A05) Coding theorems (Shannon theory) (94A24)
Related Items (8)
The security of lazy users in out-of-band authentication ⋮ Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later ⋮ A rational framework for secure communication ⋮ Authenticating ad hoc networks by comparison of short digests ⋮ Practical unconditionally secure two-channel message authentication ⋮ SAS-Based Group Authentication and Key Agreement Protocols ⋮ Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
This page was built for publication: Secure Communications over Insecure Channels Based on Short Authenticated Strings