Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
The Resurrecting Duckling - What Next?
Revised Papers from the 8th International Workshop on Security Protocols
Multichannel Security Protocols
IEEE Pervasive Computing
Authenticating ad hoc networks by comparison of short digests
Information and Computation
Proceedings of the 13th international conference on Security protocols
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Efficient mutual data authentication using manually authenticated strings
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
Hi-index | 0.01 |
In pervasive ad-hoc networks, there is a need for devices to be able to communicate securely, despite the lack of apriori shared security associations and the absence of an infrastructure such as a PKI. Previous work has shown that through the use of short verification strings exchanged over manual authentication channels, devices can establish secret session keys. We examine a construction of such a cryptographic digest function for deriving the verification string, and propose an improved construction, with weaker assumptions. We further provide a concrete instantiation which is efficient, based on finite fields.