Authentication and authenticated key exchanges
- 1 June 1992
- journal article
- Published by Springer Nature in Designs, Codes and Cryptography
- Vol. 2 (2) , 107-125
- https://doi.org/10.1007/bf00124891
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- How to Keep Authenticity Alive in a Computer NetworkPublished by Springer Nature ,2001
- An Identity-Based Key-Exchange ProtocolPublished by Springer Nature ,2001
- Secure implementation of identification systemsJournal of Cryptology, 1991
- Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocolJournal of Cryptology, 1991
- Limitations of the Kerberos authentication systemACM SIGCOMM Computer Communication Review, 1990
- A logic of authenticationACM Transactions on Computer Systems, 1990
- A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and MemoryPublished by Springer Nature ,1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Timestamps in key distribution protocolsCommunications of the ACM, 1981
- New directions in cryptographyIEEE Transactions on Information Theory, 1976