On the Security of the (F)HMQV Protocol.
Augustin P. SarrPhilippe Elbaz-VincentPublished in: AFRICACRYPT (2016)
Keyphrases
- cryptographic protocols
- security protocols
- key agreement protocol
- authentication protocol
- security properties
- key exchange protocol
- security model
- rfid systems
- security analysis
- communication protocols
- security requirements
- secure multiparty computation
- key distribution
- denial of service attacks
- security policies
- lightweight
- diffie hellman
- mutual authentication
- intrusion detection
- security services
- provably secure
- cryptographic algorithms
- privacy preserving
- access control
- network layer
- mobile payment
- virtual private network
- secure routing
- information security
- blind signature
- contractual obligations
- wireless sensor networks
- key establishment
- key agreement
- electronic voting
- statistical databases
- rfid tags
- security issues
- standard model
- elliptic curve
- security threats
- medium access control
- key exchange
- key management
- secure communication
- secret key
- blind signature scheme
- formal analysis
- security mechanisms
- protocol specification
- network security
- physical layer
- application layer