Protocols for authentication and key establishment /
Colin Boyd, Anish Mathuria.
- Berlin ; New York : Springer, c2003.
- xxiv, 321 p. ; 24 cm.
- Information security and cryptography .
1. INTRODUCTION TO AUTHENTICATION AND KEY ESTABLISHMENT Introduction Cryptographic tools Adversary capabilities Goals for authentication and key establishment etc..
2. COMPUTATIONAL SECURITY MODELS Bellare-Rogaway model Canetti-Krawczyk model eCK Model etc..