Abstract | ||
---|---|---|
We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help attackers spot errors which can be exploited. |
Year | DOI | Venue |
---|---|---|
1995 | 10.1007/3-540-44750-4_19 | CRYPTO |
Keywords | Field | DocType |
robustness principles,public key protocol,public key protocols,attackers spot error,public key | Block cipher,Computer security,Computer science,Covert channel,Robustness (computer science),Theoretical computer science,Hash function,Public-key cryptography,Oblivious transfer | Conference |
Volume | ISSN | ISBN |
963 | 0302-9743 | 3-540-60221-6 |
Citations | PageRank | References |
95 | 18.26 | 20 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ross J. Anderson | 1 | 5349 | 971.91 |
Roger M. Needham | 2 | 4648 | 2075.99 |