: An HB-like protocol secure against man-in-the-middle attacks.
Carl BosleyKristiyan HaralambievAntonio NicolosiPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- cryptographic protocols
- secure routing
- security protocols
- cryptographic algorithms
- routing protocol
- authentication protocol
- ad hoc networks
- security properties
- covert channel
- standard model
- key agreement protocol
- stream cipher
- authenticated key agreement
- residual energy
- security mechanisms
- denial of service attacks
- secure communication
- lightweight
- vertically partitioned data
- attack scenarios
- group communication
- key exchange protocol
- provably secure
- rfid systems
- key management
- multi party
- privacy preserving