On the Security of Ping-Pong Protocols when Implemented using the RSA.
Shimon EvenOded GoldreichAdi ShamirPublished in: CRYPTO (1985)
Keyphrases
- ping pong
- key exchange
- security protocols
- public key cryptosystems
- authentication protocol
- cryptographic algorithms
- public key
- security analysis
- communication protocols
- key agreement protocol
- security services
- security properties
- intrusion detection
- cryptographic protocols
- key distribution
- private key
- elliptic curve
- public key cryptography
- elliptic curve cryptography
- diffie hellman
- access control
- digital signature scheme
- encryption scheme
- signature scheme
- statistical databases
- information security
- smart card
- group communication
- digital signature
- security mechanisms
- security issues
- security policies
- network security