Provable Cryptographic Security and its Applications to Mobile Wireless Computing

被引:1
作者
Craig Gentry
Zulfikar Ramzan
机构
[1] DoCoMo Communications Laboratories,
[2] Inc.,undefined
来源
Wireless Personal Communications | 2004年 / 29卷
关键词
cryptography; provable security;
D O I
暂无
中图分类号
学科分类号
摘要
Many attempts to secure mobile wireless systems have failed abysmally. Notable examples include 802.11 WEP, as well as major cellular phone standards such as TDMA, CDMA, and GSM. The attacks typically result from the correct use of a bad cryptographic primitive or the incorrect use of a good one.
引用
收藏
页码:191 / 203
页数:12
相关论文
共 7 条
[1]  
Burrows M.(1989)A Logic of Authentication Proceedings of the Royal Society A426 233-271
[2]  
Abadi M.(1983)On the Security of Public-Key Protocols IEEE Transactions on Information Theory 29 198-208
[3]  
Needham R.(1976)New Directions in Cryptography IEEE Transactions on Information Theory IT-22 644-654
[4]  
Dolev D.(undefined)undefined undefined undefined undefined-undefined
[5]  
Yao A.(undefined)undefined undefined undefined undefined-undefined
[6]  
Diffe W.(undefined)undefined undefined undefined undefined-undefined
[7]  
Hellman M.E.(undefined)undefined undefined undefined undefined-undefined