Login / Signup
An Attack on the Needham-Schroeder Public-Key Authentication Protocol.
Gavin Lowe
Published in:
Inf. Process. Lett. (1995)
Keyphrases
</>
public key
authentication protocol
security analysis
secret key
digital signature
authentication scheme
user authentication
private key
session key
signature scheme
public key cryptography
cryptographic protocols
encryption scheme
rfid tags
key distribution
secure communication
diffie hellman
standard model