Sciweavers

2 search results - page 1 / 1
» A Proof of Revised Yahalom Protocol in the Bellare and Rogaw...
Sort
View
CJ
2007
106views more  CJ 2007»
13 years 4 months ago
A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model
Although the Yahalom protocol, proposed by Burrows, Abadi, and Needham in 1990, is one of the most prominent key establishment protocols analyzed by researchers from the computer s...
Kim-Kwang Raymond Choo
ACISP
2006
Springer
13 years 8 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria