Results 1 - 10
of
754
Entity Authentication and Key Distribution
, 1993
"... Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of these p ..."
Abstract
-
Cited by 578 (13 self)
- Add to MetaCart
Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment
Entity Authentication and Authenticated Key
, 2006
"... This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have b ..."
Abstract
- Add to MetaCart
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have
Remarks on entity authentication
, 2006
"... We analyze five basic entity authentication protocols in the security models proposed by Bellare–Rogaway and Canetti–Krawczyk and show that each model captures disparate aspects of entity authentication. ..."
Abstract
- Add to MetaCart
We analyze five basic entity authentication protocols in the security models proposed by Bellare–Rogaway and Canetti–Krawczyk and show that each model captures disparate aspects of entity authentication.
Principles for Entity Authentication
- In Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003
, 2003
"... We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a minimal set of roles that enables us to extract general principles that should be follow ..."
Abstract
-
Cited by 11 (6 self)
- Add to MetaCart
We study the roles of message components in authentication protocols. In particular, we investigate how a certain component contributes to the task of achieving entity authentication. To this aim, we isolate a minimal set of roles that enables us to extract general principles that should
Located Entity Authentication
, 1998
"... Entity authentication should allow the verification of an entity's claimed identity, by another entity [4]. In the last years a number of definitions of entity authentication have been proposed (see, e.g., [1, 5, 8]). We show that with these notions of authentication it is not possible to verif ..."
Abstract
- Add to MetaCart
Entity authentication should allow the verification of an entity's claimed identity, by another entity [4]. In the last years a number of definitions of entity authentication have been proposed (see, e.g., [1, 5, 8]). We show that with these notions of authentication it is not possible
Unconditionally Secure Entity Authentication
, 1998
"... This paper studies the entity-authentication problem in an information theoretic framework, where adversaries are infinitely powerful. We first derive lower bounds on the cheating probability and the size of keys. Next, we show an unconditionally secure and optimum entity-authentication scheme that ..."
Abstract
- Add to MetaCart
This paper studies the entity-authentication problem in an information theoretic framework, where adversaries are infinitely powerful. We first derive lower bounds on the cheating probability and the size of keys. Next, we show an unconditionally secure and optimum entity-authentication scheme
Is entity authentication necessary?
"... Abstract. Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies, an ..."
Abstract
- Add to MetaCart
Abstract. Conventionally, mutual entity authentication is seen as the necessary precursor to the establishment of a secure connection. However, there exist examples of cases where authentication is not needed. The purpose of this paper is to consider this proposition, illustrated by case studies
Entity Authentication and Key Distribution
"... Abstract Entity authentication and key distribution are central cryptographic problems in distributed computing--but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of ..."
Abstract
- Add to MetaCart
Abstract Entity authentication and key distribution are central cryptographic problems in distributed computing--but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment
ENTITY AUTHENTICATION USING
, 1997
"... Standards and Technology (NIST) is the official series of publications relating to standards and guidelines ..."
Abstract
- Add to MetaCart
Standards and Technology (NIST) is the official series of publications relating to standards and guidelines
Limitations of Challenge-Response Entity Authentication
- Electronic Letters
, 1989
"... Abstract We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols, and show that one of them is completely insecure. ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
Abstract We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a simple modification preventing such attacks. We go on to consider three variants of the basic protocols, and show that one of them is completely insecure.
Results 1 - 10
of
754