Separating two roles of hashing in one-way message authentication
暂无分享,去创建一个
[1] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[2] Bill Roscoe. Human−centred computer security , 2006 .
[3] A. W. Roscoe,et al. Efficient group authentication protocols based on human interaction , 2009, IACR Cryptol. ePrint Arch..
[4] A. W. Roscoe,et al. Authenticating ad hoc networks by comparison of short digests , 2008, Inf. Comput..
[5] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[6] Jaap-Henk Hoepman. The Ephemeral Pairing Problem , 2004, Financial Cryptography.
[7] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[8] Douglas R. Stinson. Universal Hashing and Authentication Codes , 1991, CRYPTO.
[9] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[10] Serge Vaudenay,et al. An Optimal Non-interactive Message Authentication Protocol , 2006, CT-RSA.
[11] Serge Vaudenay,et al. Secure Communications over Insecure Channels Based on Short Authenticated Strings , 2005, CRYPTO.
[12] A. W. Roscoe,et al. Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey , 2011, J. Comput. Secur..