Inter-protocol interleaving attacks on some authentication and key distribution protocols
- 26 March 1999
- journal article
- Published by Elsevier in Information Processing Letters
- Vol. 69 (6) , 297-302
- https://doi.org/10.1016/s0020-0190(99)00023-x
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Prudent engineering practice for cryptographic protocolsIEEE Transactions on Software Engineering, 1996
- Two attacks on Neuman—Stubblebine authentication protocolsInformation Processing Letters, 1995
- On key distribution protocols for repeated authenticationACM SIGOPS Operating Systems Review, 1993
- Systematic design of a family of attack-resistant authentication protocolsIEEE Journal on Selected Areas in Communications, 1993
- A note on the use of timestamps as noncesACM SIGOPS Operating Systems Review, 1993
- A nonce-based protocol for multiple authenticationsACM SIGOPS Operating Systems Review, 1992
- A security risk of depending on synchronized clocksACM SIGOPS Operating Systems Review, 1992
- A logic of authenticationACM Transactions on Computer Systems, 1990
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978