Introduction Our results Conclusion
11 pages
English
Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus

Introduction Our results Conclusion

-

Obtenez un accès à la bibliothèque pour le consulter en ligne
En savoir plus
11 pages
English

Description

Introduction Our results Conclusion Password-based Group Key Exchange in a Constant Number of Rounds M. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval ENS and CELAR and LBNL and ENS April 26th, 2006 M. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval Password-based GKE in Constant Rounds Introduction Our results Conclusion 1 Introduction Authenticated Key Exchange Dictionary attacks Related work 2 Our results Dictionary attack on Dutta-Barua Key recovery attack on Lee-Hwang-Lee Our repaired protocol 3 Conclusion M. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval Password-based GKE in Constant Rounds

  • authenticated key

  • constant-round protocols

  • can eavesdrop

  • active adversary

  • dictionary attack

  • lee-hwang-lee

  • asymmetric authentication

  • based group


Sujets

Informations

Publié par
Nombre de lectures 12
Langue English

Exrait

Introduction
Our results
Conclusion
Password-based Group Key Exchange in a
Constant Number of Rounds
M. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval
ENS and CELAR and LBNL and ENS
thApril 26 , 2006
M. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval Password-based GKE in Constant Rounds
Introduction
Our results
Conclusion
1 Introduction
Authenticated Key Exchange
Dictionary attacks
Related work
2 Our results
Dictionary attack on Dutta-Barua
Key recovery attack on Lee-Hwang-Lee
Our repaired protocol
3 Conclusion
M. Abdalla, E. Bresson, O. Chevassut and D. Pointcheval Password-based GKE in Constant Rounds

  • Accueil Accueil
  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • BD BD
  • Documents Documents