Key confirmation and adaptive corruptions in the protocol security logic.
Prateek GuptaVitaly ShmatikovPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- security analysis
- cryptographic protocols
- secure communication
- high security
- security protocols
- authentication protocol
- private key
- security properties
- rfid systems
- diffie hellman
- key distribution
- key exchange protocol
- key agreement protocol
- communication protocols
- security mechanisms
- mobile payment
- security threats
- modal logic
- security model
- lightweight
- denial of service attacks
- public key
- security requirements
- security issues
- security policies
- key exchange
- secure multiparty computation
- semi honest
- electronic voting
- cryptographic algorithms
- intrusion detection
- encryption algorithm
- privacy preserving
- smart card
- mutual authentication
- information security
- sensor networks
- network security
- key establishment
- protocol specification
- security services
- formal analysis