Inter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols.
Wen-Guey TzengChi-Ming HuPublished in: Inf. Process. Lett. (1999)
Keyphrases
- key distribution
- security protocols
- authentication protocol
- cryptographic protocols
- key management
- group communication
- fault tolerant
- key agreement protocol
- secret key
- private key
- security mechanisms
- security services
- security properties
- lightweight
- key exchange
- smart card
- diffie hellman
- elliptic curve
- resource constrained
- secure communication
- signcryption scheme
- authentication scheme
- ad hoc networks
- wireless sensor networks
- mutual authentication
- symmetric key
- session key
- signature scheme
- rfid tags
- quality of service
- trusted third party