Browse by author
Lookup NU author(s): Professor Feng Hao
Full text for this publication is not currently held within this repository. Alternative links are provided below where available.
We describe two new attacks on the HMQV protocol. The firstattack raises a serious question on the basic definition of``authentication'' in HMQV, while the second attack isgenerally applicable to many other protocols. In addition, wepresent a new authenticated key agreement protocol called YAK.Our approach is to depend on well-established techniques suchas Schnorr's signature. Among all the related protocols, YAKappears to be the simplest so far. We believe simplicity is animportant engineering principle.
Author(s): Hao F
Editor(s): Sion, R.
Publication type: Conference Proceedings (inc. Abstract)
Publication status: Published
Conference Name: 14th International Conference on Financial Cryptography and Data Security
Year of Conference: 2010
Pages: 383-390
Publisher: Springer
URL: http://dx.doi.org/10.1007/978-3-642-14577-3_33
DOI: 10.1007/978-3-642-14577-3_33
Library holdings: Search Newcastle University Library for this item
Series Title: Lecture Notes in Computer Science
ISBN: 9783642145766