Verifying MQV-Based Protocols Using ProVerif
暂无分享,去创建一个
[1] Bruno. Blanchet,et al. Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif , 2016, Found. Trends Priv. Secur..
[2] Rosario Gennaro,et al. Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement , 2010, Pairing.
[3] Colin Boyd,et al. A Tutorial Introduction to Authentication and Key Establishment , 2003 .
[4] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[5] Mohamed M. Fouad,et al. Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing , 2014, 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).
[6] Xianming Gao,et al. A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking , 2021, Secur. Commun. Networks.
[7] Kim-Kwang Raymond Choo. Key establishment : proofs and refutations , 2006 .
[8] Colin Boyd,et al. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols , 2005, ASIACRYPT.
[9] Qiang Wang,et al. Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking , 2021, IEEE Access.
[10] Burton S. Kaliski,et al. An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..
[11] Jeng-Shyang Pan,et al. Improved ECC-Based Three-Factor Multiserver Authentication Scheme , 2021, Secur. Commun. Networks.
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Yehuda Lindell,et al. Introduction to Modern Cryptography, Second Edition , 2014 .
[14] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[15] Ben Smyth,et al. ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial , 2011 .
[16] Ashok Kumar Das,et al. On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks , 2021, IEEE Access.
[17] Rosario Gennaro,et al. Making the Diffie-Hellman Protocol Identity-Based , 2010, CT-RSA.
[18] Sahadeo Padhye,et al. An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..
[19] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).