An attack on a recursive authentication protocol A cautionary tale
- 1 January 1998
- journal article
- Published by Elsevier in Information Processing Letters
- Vol. 65 (1) , 7-10
- https://doi.org/10.1016/s0020-0190(97)00180-4
Abstract
No abstract availableKeywords
This publication has 2 references indexed in Scilit:
- Addressing weaknesses in two cryptographicprotocols of Bull, Gong and SollinsElectronics Letters, 1995
- Using one-way functions for authenticationACM SIGCOMM Computer Communication Review, 1989