- 1 Diffie, W. and Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory, (Nov. 1976).Google Scholar
- 2 Rivest, R., Shamir, A. and Adelman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, (Feb. 1978). Google ScholarDigital Library
Index Terms
- How to expose an eavesdropper
Recommendations
Denial-of-service resistance in key establishment
Denial of Service (DoS) attacks are an increasing problem for network connected systems. Key establishment protocols are applications that are particularly vulnerable to DoS attack as they are typically required to perform computationally expensive ...
Secure hierarchical authentication protocol in VANET
The 5G technology will promote the development of vehicle ad hoc networks (VANET). However, almost all the existing authentication protocols rely on a completely trusted authority (TA), which undoubtedly raises a heavy burden on the TA. On the other hand, ...
Multi‐party key generation protocol for the identity‐based signature scheme in the IEEE P1363 standard for public key cryptography
Identity‐based cryptography (IBC) is considered as a promising mechanism in the Internet of Things and ad‐hoc networks, providing lightweight authentication and powerful access control. However, it suffers from two inherent problems, i.e. key escrow and ...
Comments