KryptoKnight authentication and key distribution system
- 1 January 1992
- book chapter
- Published by Springer Nature
- p. 155-174
- https://doi.org/10.1007/bfb0013897
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Message authentication with one-way hash functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1992
- MD4 Message Digest AlgorithmPublished by RFC Editor ,1990
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- Reducing risks from poorly chosen keysPublished by Association for Computing Machinery (ACM) ,1989
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A Method for Obtaining Digital Signatures and Public-Key CryptosystemsPublished by Defense Technical Information Center (DTIC) ,1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976