<?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Design and analysis of authenticated key establishment protocols</title>
<link href="http://127.0.0.1/xmlui/handle/123456789/557" rel="alternate"/>
<subtitle/>
<id>http://127.0.0.1/xmlui/handle/123456789/557</id>
<updated>2026-04-17T06:50:28Z</updated>
<dc:date>2026-04-17T06:50:28Z</dc:date>
<entry>
<title>Design and analysis of authenticated key establishment protocols</title>
<link href="http://127.0.0.1/xmlui/handle/123456789/558" rel="alternate"/>
<author>
<name>Saha, Mounita</name>
</author>
<id>http://127.0.0.1/xmlui/handle/123456789/558</id>
<updated>2015-06-01T10:51:08Z</updated>
<published>2010-01-01T00:00:00Z</published>
<summary type="text">Design and analysis of authenticated key establishment protocols
Saha, Mounita
In the current age of information communication, security is one of the most important&#13;
concern which is attracting a lot of attention from the research community. Cryptography&#13;
is a pivotal method to offer security to communication of various information. Authentication&#13;
and key establishment protocols are cryptographic techniques that are the first steps&#13;
to set up a secure communication by authenticating the users involved and establishing&#13;
a secure key among them. The key can subsequently be used to offer various security&#13;
services. In this thesis various new protocols for authentication and key establishment are&#13;
proposed in order to enhance efficiency and security of communication.&#13;
In the design of key establishment protocols, the use of cryptographic primitives requiring&#13;
less computations are preferred to increase efficiency. Particularly, due to the&#13;
popularity of applications in heterogeneous environments, protocols having less computational&#13;
burden on the low power users have become essential. One of the design goals of&#13;
the protocols proposed in the thesis is to provide an asymmetric computational pattern to&#13;
enhance the overall efficiency. The security analysis of the protocols have been performed&#13;
under provable security model.
</summary>
<dc:date>2010-01-01T00:00:00Z</dc:date>
</entry>
</feed>
