Abstract
Techniques are suggested to construct authentication protocols on a basis of one-way functions rather than encryption algorithms. This approach is thought of interest for several reasons. It appears that this approach could achieve, at least, equally simple and capable protocols.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Software
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Novel Attack on Machine-Learning Resistant Physical Unclonable Functions;2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST);2022-06-27
2. Scenario-based specification of security protocols and transformation to security model checkers;Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems;2020-10-16
3. Security;Advanced Wireless Networks;2016-05-20
4. Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties;Foundations and Practice of Security;2016
5. A Bloom Filter Based Model for Decentralized Authorization;International Journal of Intelligent Systems;2013-03-26