Design of key establishment protocol using one-way functions to avert insider-replay attack

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this work, we have identified a class of weakness named as insider-replay attack in a number of existing protocols and propose a common design principle to avoid the weakness. Also, based on the design principles, we propose three key establishment schemes under two different scenarios. The proposed schemes are efficient in terms of number of nonce used and are based on one-way functions.

Cite

CITATION STYLE

APA

Saha, M., & RoyChowdhury, D. (2006). Design of key establishment protocol using one-way functions to avert insider-replay attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4332 LNCS, pp. 194–204). Springer Verlag. https://doi.org/10.1007/11961635_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free