ON THE STRUCTURE OF SECRET KEY EXCHANGE PROTOCOLS

被引:0
|
作者
BELLARE, M
COWEN, L
GOLDWASSER, S
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:604 / 605
页数:2
相关论文
共 50 条
  • [41] Enhanced authentication and key exchange protocols for roaming service
    Zhou, Tao
    Xu, Jing
    Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 61 - 68
  • [42] ON THE IMPORTANCE OF MEMORY RESOURCES IN THE SECURITY OF KEY EXCHANGE PROTOCOLS
    DAVIDA, G
    DESMEDT, Y
    PERALTA, R
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 11 - 15
  • [43] Authenticated Key Exchange Protocols Based on Factoring Assumption
    Huang, Hai
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
  • [44] Composability of Bellare-Rogaway Key Exchange Protocols
    Brzuska, Christina
    Fischlin, Marc
    Warinschi, Bogdan
    Williams, Stephen C.
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 51 - 61
  • [45] Computational Soundness for Key Exchange Protocols with Symmetric Encryption
    Kuesters, Ralf
    Tuengerthal, Max
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
  • [46] Security of Group Key Exchange Protocols with Different Passwords
    Phan, Raphael C. -W.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
  • [47] Highly Efficient Key Exchange Protocols with Optimal Tightness
    Cohn-Gordon, Katriel
    Cremers, Cas
    Gjosteen, Kristian
    Jacobsen, Hakon
    Jager, Tibor
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 767 - 797
  • [48] Analyzing the security flaws of internet key exchange protocols
    Zhang, Yong
    Feng, Dong-Lei
    Chen, Han-Sheng
    Bai, Ying-Cai
    Ruan Jian Xue Bao/Journal of Software, 2002, 13 (06): : 1173 - 1177
  • [49] Low Communication Complexity Protocols, Collision Resistant Hash Functions and Secret Key-Agreement Protocols
    Cohen, Shahar P.
    Naor, Moni
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT III, 2022, 13509 : 252 - 281
  • [50] Zero-Knowledge Authentication Scheme with Secret Key Exchange
    Jorgen Brandt
    Ivan Damgård
    Peter Landrock
    Torben Pedersen
    Journal of Cryptology, 1998, 11 : 147 - 159