Sciweavers

5 search results - page 1 / 1
» Bilateral Unknown Key-Share Attacks in Key Agreement Protoco...
Sort
View
JUCS
2008
166views more  JUCS 2008»
13 years 4 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
PKC
1999
Springer
211views Cryptology» more  PKC 1999»
13 years 9 months ago
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various me...
Simon Blake-Wilson, Alfred Menezes
CCS
2008
ACM
13 years 6 months ago
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard
The Unified Model (UM) key agreement protocol is an efficient Diffie-Hellman scheme that has been included in many cryptographic standards, most recently in the NIST SP 80056A sta...
Alfred Menezes, Berkant Ustaoglu
CIS
2007
Springer
13 years 11 months ago
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography
The session initiation protocol (SIP) is considered as the dominant signaling protocol for calls over the internet. However, SIP authentication typically uses HTTP digest authentic...
Fengjiao Wang, Yuqing Zhang
JAR
2006
107views more  JAR 2006»
13 years 4 months ago
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
Automated tools for finding attacks on flawed security protocols often fail to quately with group protocols. This is because the abstractions made to improve performance on fixed ...
Graham Steel, Alan Bundy