Protocol failures in cryptosystems
- 1 May 1988
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 76 (5) , 594-602
- https://doi.org/10.1109/5.4444
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- A High Speed Manipulation Detection CodePublished by Springer Nature ,2000
- On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract)Published by Springer Nature ,2000
- N Using RSA with Low Exponent in a Public Key NetworkPublished by Springer Nature ,2000
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987
- A FURTHER WEAKNESS IN THE COMMON MODULUS PROTOCOL FOR THE RSA CRYPTOALGORITHMCryptologia, 1984
- Digital signatures with RSA and other public-key cryptosystemsCommunications of the ACM, 1984
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Protocols for Data SecurityComputer, 1983
- Applied Cryptology, Cryptographic Protocols, and Computer Security ModelsProceedings of Symposia in Applied Mathematics, 1983
- Factoring polynomials with rational coefficientsMathematische Annalen, 1982