KryptoKnight Authentication and Key Distribution System (1993)

Cached

Download Links

by Refik Molva , Gene Tsudik , Els van Herreweghen , Stefano Zatti
Venue:In ESORICS '92, LNCS 648
Citations:39 - 3 self

Active Bibliography

2 Secure and Minimal Protocols for Authenticated Key Distribution – Philippe Janson, Gene Tsudik - 1995
5 On Simple and Secure Key Distribution – Gene Tsudik, Els Van Herreweghen - 1993
9 Authentication Method with Impersonal Token Cards – Refik Molva, Gene Tsudik - 1993
40 Authentication of Mobile Users – Refik Molva, Didier Samfat, Gene Tsudik - 1994
106 Message Authentication with One-Way Hash Functions – Gene Tsudik - 1992
1 Robust and Secure Password and Key Change Method – Ralf Hauser, Philippe Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen - 1994
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
A Protocol for Forwarding Route Establishment and Packet – Across Multidomain Internets, Deborah Estrin, Martha Steenstrup, Gene Tsudik
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
113 Protecting Poorly Chosen Secrets from Guessing Attacks – Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer - 1993
32 The evolution of the Kerberos authentication service – John T. Kohl, B. Clifford Neuman - 1994
KryptoKnight Protocol Cookbook – Philippe Janson, Gene Tsudik, Moti Yung - 1994
6 Variations on the Themes of Message Freshness and Replay - or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols – Li Gong - 1993
14 Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks – Barry Jaspan - 1996
5 An End-to-End Argument for Network Layer, Inter-Domain Access Controls – Deborah Estrin, Deborah Estrin, Gene Tsudik, Gene Tsudik - 1991
unknown title – Foreword Whitfield Diffie
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
Encrypted Key Exchange – Michael Steiner, Gene Tsudik, Michael Waidner - 1995
1 Observations on Information Security Crisis – Jussipekka Leiwo