Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches

被引:0
|
作者
Meadows, C.A.
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications
    Coron, Jean-Sebastien
    Gouget, Aline
    Paillier, Pascal
    Villegas, Karine
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 107 - +
  • [43] Polly two: A new algebraic polynomial-based public-key scheme
    Van Ly, Le
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (3-4) : 267 - 283
  • [44] Polly Two : A New Algebraic Polynomial-based Public-Key Scheme
    Le Van Ly
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 267 - 283
  • [45] ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks
    Mahmoud, Mohamed Elsalih
    Shen, Xuemin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (07) : 997 - 1010
  • [46] Quantum public-key cryptosystem without exchanging qubits between any two users
    Li X.
    Shang Y.
    1600, Computer Society of the Republic of China (28): : 13 - 25
  • [47] A New High-Performance Public-Key Encryption Scheme Using Two Algebras
    Al-Bairmani, Sukaina Abdullah
    Hani, Najwan Noori
    Yassein, Hassan Rashed
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2024, 20 (01): : 435 - 438
  • [48] Mobile IP registration protocol: a security attack and new secure minimal public-key based authentication
    Natl Univ of Singapore, Singapore
    Int Symp Parall Archit Algorithms Networks I SPAN, (364-369):
  • [49] Mobile IP registration protocol: A security attack and new secure minimal public-key based authentication
    Sufatrio
    Lam, KY
    FOURTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS, AND NETWORKS (I-SPAN'99), PROCEEDINGS, 1999, : 364 - 369
  • [50] Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems
    Koschuch, Manuel
    Grossschaedl, Johann
    Page, Dan
    Grabher, Philipp
    Hudler, Matthias
    Kruger, Michael
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2009, 5927 : 63 - +