Efficient Mutual Data Authentication Using Manually Authenticated Strings. Cryptology ePrint Archive, Report 2005/424 (2005)

by Sven Laur , Kaisa Nyberg
Citations:65 - 7 self

Active Bibliography

TKK Dissertations in Information and Computer Science Espoo 2008 TKK-ICS-D2 CRYPTOGRAPHIC PROTOCOL DESIGN – Sven Laur, Teknillinen Korkeakoulu, C Sven Laur, Multiprint Oy
Preprinted with kind permission of Springer Science and Business Media. Efficient Mutual Data Authentication Using Manually Authenticated Strings – Sven Laur, Kaisa Nyberg
1 CRYPTOGRAPHIC PROTOCOL DESIGN Doctoral Dissertation – Sven Laur, Abteknillinen Korkeakoulu, Universite De, Sven Laur, Tietotekniikan Osasto
15 Sas-based group authentication and key agreement protocols – Sven Laur, Sylvain Pasini - 2008
86 Secure communications over insecure channels based on short authenticated strings – Serge Vaudenay
13 Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey – L. H. Nguyen, A. W. Roscoe - 2009
12 Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks – Jonathan Katz - 2002
8 Tight bounds for unconditional authentication protocols in the manual channel and shared key models – Moni Naor, Gil Segev, Adam Smith - 2006
Chorus: Scalable In-band Trust Establishment for Multiple Constrained Devices over the Insecure Wireless Channel ABSTRACT – Yantian Hou, Ming Li
Special issue on ”Secure Spontaneous Interaction” – Sven Laur, Sylvain Pasini
00 Secure Ad-Hoc Trust Initialization and Key Management in Wireless Body Area Networks – Ming Li
1 Rational authentication protocols – Long H. Nguyen
34 Concurrent non-malleable commitments – Rafael Pass, Alon Rosen - 2005
Authentication protocols in pervasive computing – Nguyen Hoang Long
5 Constant-Round Non-Malleable Commitments from Any One-Way Function – Huijia Lin, Rafael Pass - 2011
39 Perfect non-interactive zero knowledge for NP – Jens Groth, Rafail Ostrovsky, Amit Sahai - 2006
18 Authenticating ad hoc networks by comparison of short digests – L. H. Nguyen, A. W. Roscoe - 2010
8 The candidate key protocol for generating secret shared keys from similar sensor data streams – Rene Mayrhofer - 2007
11 Groupthink: Usability of Secure Group Association for Wireless Devices – Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ersin Uzun - 2010