Provably Insecure Mutual Authentication Protocols: The Two-Party Symmetric-Encryption Case
暂无分享,去创建一个
[1] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[2] Mihir Bellare,et al. Practice-Oriented Provable-Security , 1997, ISW.
[3] Bruce Schneier,et al. Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.
[4] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[5] Wen-Guey Tzeng,et al. Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols , 1999, Inf. Process. Lett..
[6] Victor Shoup,et al. Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.
[7] Stefan Lucks,et al. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys , 1997, Security Protocols Workshop.
[8] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[9] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[10] Alfred Menezes,et al. Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques , 1997, Security Protocols Workshop.
[11] Daryl McCullough,et al. Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[12] Jim Alves-Foss. Multi-Protocol Attacks and the Public Key Infrastructure , 1998 .