[PDF][PDF] A modular approach to the design and analysis of authentication and key exchange protocols
We prcscnt a general framework for constructing and analyzing authentication protocols in
realistic models of communication networks. This framework provides a sound formalization …
realistic models of communication networks. This framework provides a sound formalization …
Environmental key generation towards clueless agents
J Riordan, B Schneier - Mobile agents and security, 1998 - Springer
In this paper, we introduce a collection of cryptographic key constructions built from
environmental data that are resistant to adversarial analysis and deceit. We expound upon …
environmental data that are resistant to adversarial analysis and deceit. We expound upon …
Design issues in mobile agent programming systems
NM Karnik, AR Tripathi - IEEE concurrency, 1998 - ieeexplore.ieee.org
The article discusses system-level issues and agent programming requirements that arise in
the design of mobile agent systems. The authors describe several mobile agent systems to …
the design of mobile agent systems. The authors describe several mobile agent systems to …
About the Security of MTI/C0 and MQV
S Kunz-Jacques, D Pointcheval - … , SCN 2006, Maiori, Italy, September 6-8 …, 2006 - Springer
The main application of cryptography is the establishment of secure channels. The most
classical way to achieve this goal is definitely the use of variants of the signed Diffie-Hellman …
classical way to achieve this goal is definitely the use of variants of the signed Diffie-Hellman …
Comparing the pre-and post-specified peer models for key agreement
A Menezes, B Ustaoglu - … Conference on Information Security and Privacy, 2008 - Springer
In the pre-specified peer model for key agreement, it is assumed that a party knows the
identifier of its intended communicating peer when it commences a protocol run. On the …
identifier of its intended communicating peer when it commences a protocol run. On the …
Cryptanalysis of mutual authentication and key exchange for low power wireless communications
K Shim - IEEE communications letters, 2003 - ieeexplore.ieee.org
Cryptanalysis of mutual authentication and key exchange for low power wireless
communications Page 1 248 IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 5, MAY …
communications Page 1 248 IEEE COMMUNICATIONS LETTERS, VOL. 7, NO. 5, MAY …
A formal language for cryptographic protocol requirements
P Syverson, C Meadows - Designs, Codes and Cryptography, 1996 - Springer
In this paper we present a formal language for specifying and reasoning about cryptographic
protocol requirements. We give sets of requirements for key distribution protocols and for key …
protocol requirements. We give sets of requirements for key distribution protocols and for key …
A secure group communication protocol for ad hoc wireless networks
YM Tseng, CC Yang, DR Liao - Advances in Wireless Ad Hoc and Sensor …, 2007 - Springer
1.1 Background Recently, group communication has been an efficient mechanism for
grouporiented applications such as video-conferencing, collaborative work, networking …
grouporiented applications such as video-conferencing, collaborative work, networking …
Formal requirements for key distribution protocols
P Syverson, C Meadows - Workshop on the Theory and Application of of …, 1994 - Springer
We discuss generic formal requirements for reasoning about two party key distribution
protocols, using a language developed for specifying security requirements for security …
protocols, using a language developed for specifying security requirements for security …
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow parties to share
secret keys in an authentic manner based on an easily memorizable password. Byun et al …
secret keys in an authentic manner based on an easily memorizable password. Byun et al …