Efficient network authentication protocols: Lower bounds and optimal implementations
- 1 December 1995
- journal article
- Published by Springer Nature in Distributed Computing
- Vol. 9 (3), 131-145
- https://doi.org/10.1007/s004460050015
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Prudent engineering practice for cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1994
- Increasing availability and security of an authentication serviceIEEE Journal on Selected Areas in Communications, 1993
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- Lower bounds on messages and rounds for network authentication protocolsPublished by Association for Computing Machinery (ACM) ,1993
- A security risk of depending on synchronized clocksACM SIGOPS Operating Systems Review, 1992
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Using one-way functions for authenticationACM SIGCOMM Computer Communication Review, 1989
- Secure communication using remote procedure callsACM Transactions on Computer Systems, 1985
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- New directions in cryptographyIEEE Transactions on Information Theory, 1976