Computationally Secure Two-Round Authenticated Message Exchange.
Klaas Ole KürtzHenning SchnoorThomas WilkePublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- message exchange
- key exchange protocol
- key exchange
- authentication scheme
- key agreement protocol
- key distribution
- password based authenticated key exchange
- diffie hellman
- block cipher
- security analysis
- user authentication
- key management
- smart card
- real time
- security level
- authentication protocol
- encryption scheme
- security requirements
- highly efficient
- fault tolerant
- scalar product
- privacy preserving