Per-Session Security: Password-Based Cryptography Revisited.
Grégory DemayPeter GaziUeli MaurerBjörn TackmannPublished in: ESORICS (1) (2017)
Keyphrases
- information security
- key exchange protocol
- user authentication
- security analysis
- key exchange
- password based authenticated key exchange
- key agreement
- elliptic curve cryptography
- encryption algorithms
- authentication protocol
- security requirements
- diffie hellman
- authentication scheme
- security properties
- cellular automata
- security issues
- elliptic curve
- network security
- statistical databases
- intrusion detection
- access control
- cryptographic algorithms
- security problems
- security policies
- security model
- public key
- high security
- information systems
- security protocols
- public key cryptography
- secret key
- e government
- smart card
- provably secure
- private key
- security mechanisms