Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Timestamps in key distribution protocols
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences: an International Journal
Hi-index | 0.00 |
This paper presents a taxonomy of known-key attacks on athenticated key agreement protocols, which is based on the adversaries' roles and objectives. The taxonomy is illustrated using new attacks on the Just-Vaudenay and Yacobi protocol. The taxonomy is used to discuss countermeasures and protocol analysis methods against known-key attacks.