An attack on the Needham-Schroeder public-key authentication protocol
- 1 November 1995
- journal article
- Published by Elsevier in Information Processing Letters
- Vol. 56 (3), 131-133
- https://doi.org/10.1016/0020-0190(95)00144-2
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Prudent engineering practice for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1994
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976