Sciweavers

153 search results - page 7 / 31
» Multi-factor Authenticated Key Exchange
Sort
View
CCS
2001
ACM
15 years 6 months ago
Provably authenticated group Diffie-Hellman key exchange
Emmanuel Bresson, Olivier Chevassut, David Pointch...
EUROCRYPT
2001
Springer
15 years 6 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 8 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
ICICS
2010
Springer
14 years 11 months ago
Efficient Authentication for Mobile and Pervasive Computing
With today's technology, many applications rely on the existence of small devices that can exchange information and form communication networks. In a significant portion of su...
Basel Alomair, Radha Poovendran
CCS
2005
ACM
15 years 7 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov