Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
M. Choudary GorantlaColin BoydJuan Manuel González NietoPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- key exchange
- security analysis
- secure communication
- smart card
- security protocols
- authentication protocol
- private key
- diffie hellman
- key distribution
- public key
- cryptographic protocols
- security properties
- security requirements
- key exchange protocol
- digital signature
- security mechanisms
- password based authenticated key exchange