[PDF][PDF] A modular approach to the design and analysis of authentication and key exchange protocols

M Bellare, R Canetti, H Krawczyk - … annual ACM symposium on Theory of …, 1998 - dl.acm.org
We prcscnt a general framework for constructing and analyzing authentication protocols in
realistic models of communication networks. This framework provides a sound formalization …

Environmental key generation towards clueless agents

J Riordan, B Schneier - Mobile agents and security, 1998 - Springer
In this paper, we introduce a collection of cryptographic key constructions built from
environmental data that are resistant to adversarial analysis and deceit. We expound upon …

Design issues in mobile agent programming systems

NM Karnik, AR Tripathi - IEEE concurrency, 1998 - ieeexplore.ieee.org
The article discusses system-level issues and agent programming requirements that arise in
the design of mobile agent systems. The authors describe several mobile agent systems to …

About the Security of MTI/C0 and MQV

S Kunz-Jacques, D Pointcheval - … , SCN 2006, Maiori, Italy, September 6-8 …, 2006 - Springer
The main application of cryptography is the establishment of secure channels. The most
classical way to achieve this goal is definitely the use of variants of the signed Diffie-Hellman …

Comparing the pre-and post-specified peer models for key agreement

A Menezes, B Ustaoglu - … Conference on Information Security and Privacy, 2008 - Springer
In the pre-specified peer model for key agreement, it is assumed that a party knows the
identifier of its intended communicating peer when it commences a protocol run. On the …

Cryptanalysis of mutual authentication and key exchange for low power wireless communications

K Shim - IEEE communications letters, 2003 - ieeexplore.ieee.org
Cryptanalysis of mutual authentication and key exchange for low power wireless
communications Page 1 248 IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 5, MAY …

A formal language for cryptographic protocol requirements

P Syverson, C Meadows - Designs, Codes and Cryptography, 1996 - Springer
In this paper we present a formal language for specifying and reasoning about cryptographic
protocol requirements. We give sets of requirements for key distribution protocols and for key …

A secure group communication protocol for ad hoc wireless networks

YM Tseng, CC Yang, DR Liao - Advances in Wireless Ad Hoc and Sensor …, 2007 - Springer
1.1 Background Recently, group communication has been an efficient mechanism for
grouporiented applications such as video-conferencing, collaborative work, networking …

Formal requirements for key distribution protocols

P Syverson, C Meadows - Workshop on the Theory and Application of of …, 1994 - Springer
We discuss generic formal requirements for reasoning about two party key distribution
protocols, using a language developed for specifying security requirements for security …

Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols

RCW Phan, BM Goi - Progress in Cryptology-INDOCRYPT 2006: 7th …, 2006 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow parties to share
secret keys in an authentic manner based on an easily memorizable password. Byun et al …