Back to Results
First PageMeta Content



This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi
Add to Reading List

Document Date: 2011-07-10 02:35:13


Open Document

File Size: 391,10 KB

Share Result on Facebook

Company

Needham / CRC Press Inc. / /

IndustryTerm

communications sessions / non-interactive protocols / on-line actions / authentication protocol / symmetric encryption algorithm / authentication server / agreement protocols / real-time participation / transport protocols / authenticated key establishment protocol / telecommunications connection / threats protocols / establishment protocol / secure protocol / establishment protocols / encryption algorithms / inter-party communications / particular protocols / no-key protocol / Message-independent protocols / applications utilizing key establishment protocols / transport protocol / conference keying protocols / multi-party algorithm / Identity-based authentication protocols / no-key algorithm / agreement protocol / zero-pass protocols / subsequent communications / /

Position

representative / General / /

Technology

encryption / zero-pass protocols / no-key algorithm / authentication protocol / Identity-based authentication protocols / Cryptography / symmetric encryption algorithm / establishment protocol / two-party protocols / specific key establishment protocols / encryption algorithms / public key / non-interactive protocols / public-key encryption / key agreement protocol / particular protocols / key establishment protocols / Encryption applications utilizing key establishment protocols / agreement protocols / key establishment protocol / no-key protocol / key transport protocol / 12 Key Establishment Protocols / threats protocols / secret key / multi-party algorithm / conference keying protocols / secure protocol / two-pass protocols / Key transport protocols / analyzing key establishment protocols / publickey encryption / shared-key Otway-Rees Protocol / using symmetric encryption / authenticated key establishment protocol / /

URL

www.cacr.math.uwaterloo.ca/hac / /

SocialTag