Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
Stig Fr. MjølsnesJoe-Kai TsayPublished in: CoRR (2012)
Keyphrases
- security analysis
- session key
- public key
- authentication and key agreement
- security model
- authentication protocol
- key exchange
- public key cryptography
- security properties
- smart card
- encryption scheme
- secret key
- diffie hellman
- security requirements
- private key
- cryptographic protocols
- secure communication
- resource constrained