Authentication and authenticated key exchanges
W Diffie, PC Van Oorschot, MJ Wiener - Designs, Codes and cryptography, 1992 - Springer
We discuss two-party mutual authentication protocols providing authenticated key
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …
exchange, focusing on those using asymmetric techniques. A simple, efficient protocol …
Anonymity and one-way authentication in key exchange protocols
I Goldberg, D Stebila, B Ustaoglu - Designs, Codes and Cryptography, 2013 - Springer
Key establishment is a crucial cryptographic primitive for building secure communication
channels between two parties in a network. It has been studied extensively in theory and …
channels between two parties in a network. It has been studied extensively in theory and …
[PDF][PDF] A survey of authentication protocol literature: Version 1.0
1.1 Background The past two decades have seen an enormous increase in the development
and use of networked and distributed systems, providing increased functionality to the user …
and use of networked and distributed systems, providing increased functionality to the user …
Systematic design of two-party authentication protocols
We investigate protocols for authenticated exchange of messages between two parties in a
communication network. Secure authenticated exchange is essential for network security. It …
communication network. Secure authenticated exchange is essential for network security. It …
One-round protocols for two-party authenticated key exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of
simultaneous message transmission by each of the two parties (ie, using a duplex channel) …
simultaneous message transmission by each of the two parties (ie, using a duplex channel) …
Tripartite authenticated key agreement protocols from pairings
SS Al-Riyami, KG Paterson - … , Cirencester, UK, December 16-18, 2003 …, 2003 - Springer
Abstract Joux's protocol [29] is a one round, tripartite key agreement protocol that is more
bandwidth-efficient than any previous three-party key agreement protocol. But it is insecure …
bandwidth-efficient than any previous three-party key agreement protocol. But it is insecure …
Authenticated multi-party key agreement
M Just, S Vaudenay - … —ASIACRYPT'96: International Conference on the …, 1996 - Springer
We examine key agreement protocols providing (i) key authentication (ii) key confirmation
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …
and (iii) forward secrecy. Attacks are presented against previous two-party key agreement …
Entity authentication and authenticated key transport protocols employing asymmetric techniques
S Blake-Wilson, A Menezes - International Workshop on Security Protocols, 1997 - Springer
This paper investigates security proofs for protocols that employ asymmetric (public-key
techniques to solve two problems: entity authentication and authenticated key transport. A …
techniques to solve two problems: entity authentication and authenticated key transport. A …
[PDF][PDF] A survey of authentication protocol literature
1 Introduction the past two decades have seen an enormous increase in the development
and use of networked and distributed systems, providing increased functionality to the user …
and use of networked and distributed systems, providing increased functionality to the user …
Entity authentication and key distribution
We provide the first formal treatment of entity authentication and authenticated key
distribution appropriate to the distributed environment. Addressed in detail are the problems …
distribution appropriate to the distributed environment. Addressed in detail are the problems …