A survey of authentication protocol literature: Version 1.0

[1]  Paul C. Kocher Cryptanalysis of Di e-Hellman, RSA, DSS, and Other Systems Using Timing Attacks , 1999 .

[2]  Dieter Gollmann What do we mean by entity authentication? , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Steve A. Schneider Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[4]  Ross J. Anderson,et al.  On the Reliability of Electronic Payment Systems , 1996, IEEE Trans. Software Eng..

[5]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[6]  Gavin Lowe,et al.  Some new attacks upon security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[7]  A. W. Roscoe Intensional specifications of security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[8]  Colin Boyd A class of flexible and efficient key management protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[9]  John A. Clark,et al.  Attacking Authentication Protocols , 1996 .

[10]  Gavin Lowe,et al.  An Attack on the Needham-Schroeder Public-Key Authentication Protocol , 1995, Inf. Process. Lett..

[11]  John A. Clark,et al.  On the Security of Recent Protocols , 1995, Inf. Process. Lett..

[12]  Ross J. Anderson,et al.  Robustness Principles for Public Key Protocols , 1995, CRYPTO.

[13]  Randy Chow,et al.  An efficient and secure authentication protocol using uncertified keys , 1995, OPSR.

[14]  Tzonelih Hwang,et al.  On the Security of SPLICE/AS - The Authentication System in WIDE Internet , 1995, Inf. Process. Lett..

[15]  Tzonelih Hwang,et al.  Two Attacks on Neuman-Stubblebine Authentication Protocols , 1995, Inf. Process. Lett..

[16]  Catherine A. Meadows,et al.  Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.

[17]  Jennifer Seberry,et al.  Beacon Based Authentication , 1994, ESORICS.

[18]  Ross J. Anderson Liability and Computer Security: Nine Principles , 1994, ESORICS.

[19]  Gene Tsudik,et al.  Robust and Secure Password and Key Change Method , 1994, ESORICS.

[20]  Colin Boyd,et al.  On Strengthening Authentication Protocols to Foil Cryptanalysis , 1994, ESORICS.

[21]  Ross J. Anderson Why cryptosystems fail , 1994, CACM.

[22]  Mihir Bellare,et al.  The Security of Cipher Block Chaining , 1994, CRYPTO.

[23]  Simon S. Lam,et al.  A lesson on authentication protocol design , 1994, OPSR.

[24]  Ulf Carlsen Optimal privacy and authentication on a portable communications system , 1994, OPSR.

[25]  Volker Kessler,et al.  AUTLOG-an advanced logic of authentication , 1994, Proceedings The Computer Security Foundations Workshop VII.

[26]  Colin Boyd,et al.  Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.

[27]  Ulf Carlsen Generating formal cryptographic protocol specifications , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[28]  Martín Abadi,et al.  Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[29]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[30]  Paul Syverson,et al.  A Taxonomy of Replay Attacks , 1994 .

[31]  Nora Cuppens-Boulahia,et al.  Formal Development of Authentication Protocols , 1994, Refine.

[32]  Paul C. van Oorschot,et al.  An Alternate Explanation of two BAN-logic "failures" , 1994, EUROCRYPT.

[33]  Colin Boyd,et al.  On a Limitation of BAN Logic , 1994, EUROCRYPT.

[34]  Peter Honeyman,et al.  Formal Methods for the Analysis of Authentication Protocols , 1993 .

[35]  Armin Liebl,et al.  Authentication in distributed systems: a bibliography , 1993, OPSR.

[36]  Colin Boyd,et al.  Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.

[37]  Li Gong,et al.  Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.

[38]  Moti Yung,et al.  Systematic Design of a Family of Attack-Resistant Authentication Protocols , 1993, IEEE J. Sel. Areas Commun..

[39]  Jerome H. Saltzer,et al.  Protecting Poorly Chosen Secrets from Guessing Attacks , 1993, IEEE J. Sel. Areas Commun..

[40]  Walter Fumy,et al.  Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..

[41]  Catherine A. Meadows,et al.  A logical language for specifying cryptographic protocol requirements , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[42]  B. Clifford Neuman,et al.  A note on the use of timestamps as nonces , 1993, OPSR.

[43]  Thomas Y. C. Woo,et al.  Authentication for distributed systems , 1997, Computer.

[44]  Ross J. Anderson UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.

[45]  Jürgen Schönwälder,et al.  A nonce-based protocol for multiple authentications , 1992, OPSR.

[46]  J.A. Adam Data security-cryptography=privacy? , 1992, IEEE Spectrum.

[47]  Reihaneh Safavi-Naini,et al.  Partial belief and probabilistic reasoning in the analysis of secure protocols , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.

[48]  Virgil D. Gligor,et al.  On message integrity in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[49]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[50]  E. Snekkenes Roles in cryptographic protocols , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[51]  Gene Tsudik,et al.  Message authentication with one-way hash functions , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[52]  Moti Yung,et al.  Systematic Design of Two-Party Authentication Protocols , 1991, CRYPTO.

[53]  Li Gong Handling infeasible specifications of cryptographic protocols , 1991, Proceedings Computer Security Foundations Workshop IV.

[54]  Einar Snekkenes Exploring the BAN approach to protocol analysis , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[55]  Paul F. Syverson The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[56]  Colin Boyd,et al.  Hidden assumptions in cryptographic protocols , 1990 .

[57]  Li Gong A note on redundancy in encrypted messages , 1990, CCRV.

[58]  Steven M. Bellovin,et al.  Limitations of the Kerberos authentication system , 1990, CCRV.

[59]  K. Okayama,et al.  Design and implementation of an authentication system in WIDE Internet environment , 1990, IEEE TENCON'90: 1990 IEEE Region 10 Conference on Computer and Communication Systems. Conference Proceedings.

[60]  Don Davis,et al.  Network security via private-key certificates , 1990, OPSR.

[61]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[62]  Dan M. Nessett,et al.  A critique of the Burrows, Abadi and Needham logic , 1990, OPSR.

[63]  Chris Mitchell,et al.  Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.

[64]  Martín Abadi,et al.  Rejoinder to Nessett , 1990, OPSR.

[65]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[66]  L. Gong,et al.  Using one-way functions for authentication , 1989, CCRV.

[67]  Martín Abadi,et al.  The Scope of a Logic of Authentication , 1989, Distributed Computing And Cryptography.

[68]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[69]  J. H. Moore Protocol failures in cryptosystems , 1988, Proc. IEEE.

[70]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[71]  Gustavus J. Simmons,et al.  How to insure that data acquired to verify treaty compliance are trustworthy , 1988, Proc. IEEE.

[72]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[73]  E. Brickell,et al.  Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.

[74]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[75]  Richard A. Kemmerer Using Formal Verification Techniques to Analyze Encryption Protocols , 1987, 1987 IEEE Symposium on Security and Privacy.

[76]  Jonathan K. Millen,et al.  The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.

[77]  Roger M. Needham,et al.  Authentication revisited , 1987, OPSR.

[78]  Owen Rees,et al.  Efficient and timely mutual authentication , 1987, OPSR.

[79]  Charles Cresson Wood,et al.  Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.

[80]  Andrew Birrell Secure communication using remote procedure calls , 1985, TOCS.

[81]  Stephen T. Kent,et al.  Security Mechanisms in High-Level Network Protocols , 1983, CSUR.

[82]  Selim G. Aki Digital signatures: A tutorial survey , 1983, Computer.

[83]  Michael Willett Cryptography old and new , 1982, Comput. Secur..

[84]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[85]  Michael Willett,et al.  A tutorial on public key cryptography , 1982, Comput. Secur..

[86]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[87]  M. Hellman The Mathematics of Public-Key Cryptography , 1979 .

[88]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[89]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[90]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.