Quantum Security of the UMTS-AKA Protocol and its Primitives, Milenage and TUAK.
Paul FrixonsSébastien CanardLoïc FerreiraPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- ban logic
- security architecture
- security model
- formal analysis
- key agreement protocol
- communication protocols
- key exchange protocol
- security analysis
- security properties
- access control
- rfid systems
- diffie hellman
- information security
- secure multiparty computation
- security requirements
- security services
- mutual authentication
- provably secure
- lightweight
- intrusion detection
- key distribution
- mobile payment
- heterogeneous networks
- secure routing
- key exchange
- denial of service attacks
- elliptic curve
- electronic voting
- rfid tags
- mobile agent system
- physical layer
- virtual private network
- security mechanisms
- privacy preserving
- key agreement
- security policies
- semi honest
- homomorphic encryption
- messages exchanged
- contractual obligations
- smart card
- network security
- trusted third party
- security issues
- privacy protection
- signature scheme
- group communication
- public key
- sensitive data
- application layer
- key management