Back to Results
First PageMeta Content
Computing / Information / Internet standards / Secure communication / Extensible Authentication Protocol / Secure Shell / Transport Layer Security / Cipher suite / TLS-SRP / Cryptographic protocols / Internet protocols / Data


Verified Contributive Channel Bindings for Compound Authentication Karthikeyan Bhargavan, Antoine Delignat-Lavaud, and Alfredo Pironti INRIA Paris-Rocquencourt karthikeyan.bhargavan,antoine.delignat-lavaud,alfredo.piront
Add to Reading List

Document Date: 2015-03-09 10:28:16


Open Document

File Size: 540,30 KB

Share Result on Facebook

City

San Diego / /

Company

IKEv2 SA / S IKEv2 SA / Authenticated IKEv2 SA / Google / Needham / Server R Responder Authenticated IKEv2 SA / Initiator IKE SA / Small Subgroup / IKE SA / /

/

Event

FDA Phase / /

IndustryTerm

weak password-based protocols / authentication protocol / proposed re-authentication protocol / Similar layered compound authentication protocols / given protocol / composite protocol / web browsers / subsequent mutual authentication protocol / application-level user authentication protocols / re-exchange protocol / serverauthentication transport protocol / mandatory protocol / public-key protocol / keyexchange protocols / formal tools / transport protocol / above protocol / subsequent user authentication protocol / wireless network authentication protocols / wireless networks / certificate-based user authentication protocol / compound authentication protocols / cryptographic protocols / described compound authentication protocols / transport protocols / transport-level protocol / re-keying protocol / user authentication protocol / individual authentication protocols / Internet Protocol Security / prime order / particular compound authentication protocol / composite authentication protocols / application-level protocol / individual authentication protocol / application protocols / compound authentication protocol / session resumption protocols / subsequent application-level authentication protocol / arbitrary / formal protocol / authentication protocols / transportlevel protocol / /

NaturalFeature

TLS channel / /

OperatingSystem

Microsoft Windows / /

Organization

NR SSH / ISBN / Internet Society / /

Person

Alfredo Pironti / Antoine Delignat-Lavaud / /

Position

first-named author / author / forward / /

Product

ProVerif / Diffie-Hellman / SCRAM / IKEv2 / Figure / authentication / /

ProvinceOrState

Kansas / /

Technology

authentication protocol / anonymous Diffie-Hellman key exchange protocol / Application Program Interface / wireless network authentication protocols / SASL user authentication protocol / transport-level protocol / application-level protocol / above protocol / re-exchange protocol / Re-keying protocols / compound authentication protocol / key exchange protocol / Schroeder public-key protocol / IP / serverauthentication transport protocol / RSA encryption / key exchange protocols / The SSH user authentication protocol / user authentication protocol / composite TLSRSA+SCRAM protocol / key transport protocol / private key / SRP protocol / two protocols / re-keying protocol / application-level user authentication protocols / SSH protocol / Secure Shell / TLS-based compound authentication protocols / SCRAM protocol / particular compound authentication protocol / transport protocols / previously described compound authentication protocols / weak password-based protocols / encryption / application protocols / cryptography / transportlevel protocol / subsequent user authentication protocol / Confinement Diffie-Hellman key exchange protocols / public key / TLS protocol / keyexchange protocols / session resumption protocols / authentication protocols / SSH key exchange protocol / Similar layered compound authentication protocols / Compound authentication protocols / composite protocol / transport protocol / SSH user authentication protocol / proposed re-authentication protocol / individual authentication protocol / HTTP / exchange protocols / subsequent application-level authentication protocol / given protocol / composite authentication protocols / two-party authentication protocols / subsequent mutual authentication protocol / 3 For protocols / individual authentication protocols / certificate-based user authentication protocol / calculated using the SRP protocol / /

URL

http /

SocialTag