An efficient identification protocol secure against concurrent-reset attacks.
Jiang WuDouglas R. StinsonPublished in: J. Math. Cryptol. (2009)
Keyphrases
- cryptographic protocols
- secure routing
- security protocols
- cryptographic algorithms
- security mechanisms
- authentication protocol
- covert channel
- security properties
- ad hoc networks
- denial of service attacks
- scalar product
- routing protocol
- group communication
- standard model
- key distribution
- security measures
- lightweight
- stream cipher
- security requirements
- provably secure
- security model
- homomorphic encryption
- countermeasures