Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250)
DOI: 10.1109/iscc.1999.780753
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of a new hybrid encryption protocol for authentication and key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…This module is exeeuted when two principals A and B want to communicate seeurely. The symmetrie key K is eomputed as a XY mod p. The goals of the module are (as stated in [EHA98]):…”
Section: Authentication and Key Distribution Modulementioning
confidence: 99%
See 3 more Smart Citations
“…This module is exeeuted when two principals A and B want to communicate seeurely. The symmetrie key K is eomputed as a XY mod p. The goals of the module are (as stated in [EHA98]):…”
Section: Authentication and Key Distribution Modulementioning
confidence: 99%
“…The BAN logic analysis performed in [EHA98] deals only with the authentication and key distribution module. Therefore, initial assumptions in the analysis are based on the correctness and security of the setup and the login modules.…”
Section: Fake Authenticitymentioning
confidence: 99%
See 2 more Smart Citations
“…The new protocol, which is named AUTHMAC_DH, is based on work done in [7,8] and has the aim to achieve a comparable performance with the Kerberos protocol and overcome its drawbacks [9]. The paper is organized as follows: in Section 2, a description of the new protocol is detailed.…”
Section: Introductionmentioning
confidence: 99%