Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches

被引:0
|
作者
Meadows, C.A.
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Quantum public-key encryption protocol based on single-photon
    Luo, Wen-Jun
    Liu, Guan-Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 : 9 - 13
  • [32] A Scenario-Based Protocol Checker for Public-Key Authentication Scheme
    Saito, Takamichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (06): : 1268 - 1279
  • [33] Two-Message Authenticated Key Exchange from Public-Key Encryption
    Lyu, You
    Liu, Shengli
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 414 - 434
  • [34] Analysis of Two Public-key Encryptions based on Lattice Problems
    Kim, Jinsu
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (11): : 126 - 131
  • [35] A Knapsack Public-key Cryptosystem Using Two Random Sequences
    Murakami, Yasuyuki
    Hamasho, Shinsuke
    Kasahara, Masao
    2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 497 - 501
  • [36] Protocol of two-phase handshaking security socket layer based on SWIM card public-key authentication
    Chang, Chaowen
    Qin, Zheng
    Si, Zhigang
    Han, Peisheng
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2007, 41 (06): : 669 - 673
  • [37] Comparative performance analysis of public-key cryptographic operations in the WTLS handshake protocol
    Rodríguez-Henríquez, F
    López-Peza, CE
    León-Chávez, MA
    2004 1st International Conference on Electrical and Electronics Engineering (ICEEE), 2004, : 124 - 129
  • [38] Public-Key Infrastructure for the secure Border Gateway Protocol (S-BGP)
    Seo, K
    Lynn, C
    Kent, S
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 239 - 253
  • [39] Implementation of Public-Key Infrastructure for Smart Parking System Using MQTT Protocol
    Vijayan, Rajilal Manathala
    Ezhilarasie, R.
    Umamakeswari, A.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1029 - 1037
  • [40] New Public-Key Cryptosystem Based on Two-Dimension DLP
    Zhang, Xiaoqiang
    Zhu, Guiliang
    Wang, Weiping
    Wang, Mengmeng
    Ma, Shilong
    JOURNAL OF COMPUTERS, 2012, 7 (01) : 169 - 178