Cryptanalysis of the Secure Sessions from Weak Secrets Protocols.
Jolyon ClulowPublished in: Int. J. Netw. Secur. (2006)
Keyphrases
- secret key
- key distribution
- cryptographic protocols
- security protocols
- authentication protocol
- key establishment
- key exchange
- block cipher
- key management
- key agreement protocol
- security properties
- signature scheme
- multi party
- secure multiparty computation
- secure communication
- application level
- group communication
- security services
- smart card
- security issues
- digital signature
- communication protocols
- authentication scheme
- trusted third party
- homomorphic encryption
- public key cryptosystems
- hash functions
- privacy preserving
- diffie hellman
- public key
- security requirements
- mutual authentication
- standard model
- sensor networks
- wireless sensor networks
- web pages