Identification Protocols Secure Against Reset Attacks.
Mihir BellareMarc FischlinShafi GoldwasserSilvio MicaliPublished in: IACR Cryptol. ePrint Arch. (2000)
Keyphrases
- security protocols
- cryptographic protocols
- secure routing
- cryptographic algorithms
- authentication protocol
- security mechanisms
- security services
- security flaws
- security properties
- key exchange
- key management
- countermeasures
- key distribution
- chosen plaintext
- security measures
- secure communication
- stream cipher
- group communication
- key agreement protocol
- multi party
- security threats
- authentication scheme
- security requirements
- key establishment
- security issues
- block cipher
- security analysis
- routing protocol