(Enter summary)
Abstract: We discuss two-party mutual authentication protocols providing
authenticated key exchange, focusing on those using asymmetric techniques. A simple,
efficient protocol referred to as the station-to-station (STS) protocol is introduced,
examined in detail, and considered in relation to existing protocols. The definition of a
secure protocol is considered, and desirable characteristics of secure protocols are
discussed. (Update)
Cited by: More
An Encapsulated Authentication Logic - For Reasoning About
(Correct)
On the Performance, Feasibility, and Use of Forward-Secure.. - Cronin, Jamin, al. (2003)
(Correct)
An Efficient Authenticated Asymmetric Key Exchange Scheme - Chakraborty, Nandi (2000)
(Correct)
Active bibliography (related documents): More All
0.3: A Method for Examining Cryptographic Protocols - Tjaden (1997)
(Correct)
0.3: Computation of Discrete Logarithms in Prime Fields - LaMacchia, Odlyzko (1991)
(Correct)
0.3: A Formal Semantics for Evaluating Cryptographic Protocols - Yasinsac (1996)
(Correct)
Similar documents based on text: More All
0.3: On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Wiener (1996)
(Correct)
0.3: Parallel Collision Search with Cryptanalytic Applications - van Oorschot, Wiener (1996)
(Correct)
0.3: A Known-Plaintext Attack on Two-Key Triple Encryption - van Oorschot, Wiener (1990)
(Correct)
Related documents from co-citation: More All
30: New directions in cryptography
- Diffie, Hellman - 1976
25: Entity authentication and key distribution (context) - Bellare, Rogaway - 1993
18: Using encryption for authentication in large networks of computers (context) - Needham, Schroeder - 1978
BibTeX entry: (Update)
W. Diffie, P. C. van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 1992. http://citeseer.ist.psu.edu/diffie92authentication.html More
@article{ diffie92authentication,
author = "Whitfield Diffie and Paul C. van Oorschot and Michael J. Wiener",
title = "Authentication and Authenticated Key Exchanges",
journal = "Designs, Codes and Cryptography",
volume = "2",
number = "2",
pages = "107-125",
year = "1992",
url = "citeseer.ist.psu.edu/diffie92authentication.html" }
Citations (may not include all citations):
1529
A method for obtaining digital signatures and public-key cry..
- Rivest, Shamir et al. - 1978
635
New directions in cryptography
- Diffie, Hellman - 1976
601
A public key cryptosystem and a signature scheme based on di.. (context) - ElGamal - 1985
411
How to prove yourself: practical solutions to identification..
- Fiat, Shamir - 1987
302
A logic of authentication
- Burrows, Abadi et al. - 1990
201
Identity-based cryptosystems and signature schemes (context) - Shamir - 1985
176
Timestamps in key distribution protocols (context) - Denning, Sacco - 1981
168
An Improved Algorithm for Computing Logarithms over GF(p) an.. (context) - Pohlig, Hellman - 1978
136
The Kerberos network authentication service
- Kohl, Neuman - 1991
132
How to time-stamp a digital document
- Haber, Stornetta - 1991
122
A practical zero-knowledge protocol fitted to security micro.. (context) - Guillou, Quisquater - 1988
118
The Directory-Authentication Framework (context) - Book - 1988
112
Efficient identification and signatures for smart cards (context) - Schnorr - 1990
79
Limitations of the Kerberos authentication system
- Bellovin, Merritt - 1990
56
Systematic design of two-party authentication protocols
- Bird, Gopal et al.
47
Discrete logarithms in finite fields and their cryptographic..
- Odlyzko - 1985
47
Protocol failures in cryptosystems (context) - Moore - 1988
40
Computation of Discrete Logarithms in Prime Fields
- LaMacchia, Odlyzko - 1991
21
How to expose an eavesdropper (context) - Rivest, Shamir - 1984
12
Limitations of challenge-response entity authentication (context) - Mitchell - 1989
11
Key distribution system based on identification information (context) - Okamoto, Tanaka - 1989
8
How to keep authenticity alive in a computer network (context) - Bauspie, Knobloch - 1990
7
Secure implementation of identification system (context) - Bengio, Brassard et al. - 1991
4
Applying a formal analysis technique to the CCITT X.509 stro.. (context) - Gaarder, Snekkenes - 1991
1
Security defects in CCITT Recommendation X.509 - The Directo.. (context) - I'Anson, Mitchell - 1990
1
An identity-based key-exchange protocol (context) - Gnther - 1990
1
Encryption and ISDN - A Natural Fit (context) - O'Higgins, Diffie et al. - 1987
1
BerlinNew York Springer Verlag (context) - Modern, Notes et al. - 1988
The graph only includes citing articles where the year of publication is known.
Documents on the same site (http://www.scs.carleton.ca/~paulv/papers/): More
Addressing Online Dictionary Attacks with Login.. - Stubblebine, van.. (2004)
(Correct)
Security Analysis of the Message Authenticator Algorithm.. - Preneel, Rijmen, van.. (1997)
(Correct)
A Generic Attack on Checksumming-Based Software Tamper.. - Wurster, van Oorschot, .. (2005)
(Correct)
Online articles have much greater impact More about CiteSeer.IST Add search form to your site Submit documents Feedback
CiteSeer.IST - Copyright Penn State and NEC