Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1
- 1 January 2009
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key ModelsLecture Notes in Computer Science, 2006
- Efficient Mutual Data Authentication Using Manually Authenticated StringsLecture Notes in Computer Science, 2006
- Secure Communications over Insecure Channels Based on Short Authenticated StringsLecture Notes in Computer Science, 2005
- Ephemeral Pairing on Anonymous NetworksLecture Notes in Computer Science, 2005
- The Ephemeral Pairing ProblemLecture Notes in Computer Science, 2004
- Entity Authentication and Key DistributionPublished by Springer Science and Business Media LLC ,2001
- Efficient and Non-interactive Non-malleable CommitmentLecture Notes in Computer Science, 2001
- Analysis of Key-Exchange Protocols and Their Use for Building Secure ChannelsLecture Notes in Computer Science, 2001
- Authenticated Key Exchange Secure against Dictionary AttacksLecture Notes in Computer Science, 2000
- Nonmalleable CryptographySIAM Journal on Computing, 2000