<?xml version="1.0" encoding="UTF-8"?><rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="http://127.0.0.1/xmlui/handle/123456789/557">
<title>Design and analysis of authenticated key establishment protocols</title>
<link>http://127.0.0.1/xmlui/handle/123456789/557</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://127.0.0.1/xmlui/handle/123456789/558"/>
</rdf:Seq>
</items>
<dc:date>2026-04-16T16:39:45Z</dc:date>
</channel>
<item rdf:about="http://127.0.0.1/xmlui/handle/123456789/558">
<title>Design and analysis of authenticated key establishment protocols</title>
<link>http://127.0.0.1/xmlui/handle/123456789/558</link>
<description>Design and analysis of authenticated key establishment protocols
Saha, Mounita
In the current age of information communication, security is one of the most important&#13;
concern which is attracting a lot of attention from the research community. Cryptography&#13;
is a pivotal method to offer security to communication of various information. Authentication&#13;
and key establishment protocols are cryptographic techniques that are the first steps&#13;
to set up a secure communication by authenticating the users involved and establishing&#13;
a secure key among them. The key can subsequently be used to offer various security&#13;
services. In this thesis various new protocols for authentication and key establishment are&#13;
proposed in order to enhance efficiency and security of communication.&#13;
In the design of key establishment protocols, the use of cryptographic primitives requiring&#13;
less computations are preferred to increase efficiency. Particularly, due to the&#13;
popularity of applications in heterogeneous environments, protocols having less computational&#13;
burden on the low power users have become essential. One of the design goals of&#13;
the protocols proposed in the thesis is to provide an asymmetric computational pattern to&#13;
enhance the overall efficiency. The security analysis of the protocols have been performed&#13;
under provable security model.
</description>
<dc:date>2010-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
