On Session Key Construction in Provably-Secure Key Establishment Protocols
- 1 January 2005
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 116-131
- https://doi.org/10.1007/11554868_9
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Identity based authenticated key agreement protocols from pairingsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Security Analysis of a Password Authenticated Key Exchange ProtocolLecture Notes in Computer Science, 2003
- Protocols for Authentication and Key EstablishmentPublished by Springer Nature ,2003
- Analysis of Key-Exchange Protocols and Their Use for Building Secure ChannelsLecture Notes in Computer Science, 2001
- Authenticated Key Exchange Secure against Dictionary AttacksLecture Notes in Computer Science, 2000
- A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)Published by Association for Computing Machinery (ACM) ,1998
- Entity authentication and authenticated key transport protocols employing asymmetric techniquesPublished by Springer Nature ,1998
- Key agreement protocols and their security analysisLecture Notes in Computer Science, 1997
- Provably secure session key distributionPublished by Association for Computing Machinery (ACM) ,1995
- Timestamps in key distribution protocolsCommunications of the ACM, 1981