Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack.
Hung-Min SunKing-Hang WangPublished in: ISECS (2008)
Keyphrases
- secret key
- authentication protocol
- smart card
- public key
- authentication scheme
- session key
- secret data
- key management
- key distribution
- pseudorandom
- secure communication
- user authentication
- signature scheme
- key agreement
- cryptographic protocols
- security analysis
- encryption scheme
- ciphertext
- hash functions
- block cipher
- information systems
- ddos attacks
- operating system
- intrusion detection
- database systems
- real time