Explicit Communication Revisited: Two New Attacks on Authentication Protocols
暂无分享,去创建一个
[1] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Tatu Ylonen,et al. SSH: secure login connections over the internet , 1996 .
[3] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[4] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.
[5] David Safford,et al. Texas A&M University Anarchistic Key Authorization (AKA) , 1996, USENIX Security Symposium.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Tatu Ylonen,et al. SSH Transport Layer Protocol , 1996 .
[8] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[9] Alan O. Freier,et al. The SSL Protocol Version 3.0 , 1996 .
[10] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .