{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:04:13Z","timestamp":1767967453672,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540551881","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_3","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"44-61","source":"Crossref","is-referenced-by-count":42,"title":["Systematic Design of Two-Party Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Ray","family":"Bird","sequence":"first","affiliation":[]},{"given":"Inder","family":"Gopal","sequence":"additional","affiliation":[]},{"given":"Amir","family":"Herzberg","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Janson","sequence":"additional","affiliation":[]},{"given":"Shay","family":"Kutten","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi and M. Tuttle, A semantics for a logic of authentication, PODC 1991, pp. 201\u2013216","DOI":"10.1145\/112600.112618"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/357369.357373","volume":"13","author":"R. K. Bauer","year":"1983","unstructured":"R. K. Bauer, T. A. Berson and R. J. Freiertag, A key distribution protocol using event markers. ACM TOCS 13 (1983) pp. 249\u2013255.","journal-title":"ACM TOCS"},{"issue":"5","key":"3_CR3","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"30","author":"S. M. Bellovin","year":"1990","unstructured":"S. M. Bellovin and M. Merritt, Limitations of the Kerberos Authentication System. ACM Computer Communication Review 30,5 (1990) 119\u2013132.","journal-title":"ACM Computer Communication Review"},{"key":"3_CR4","unstructured":"E. Biham and A. Shamir, Differential cryptanalysis of des-like cryptosystems. Crypto-90."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi and R. M. Needham, A logic of authentication. Proc. 12th ACM SOSP, ACM OSR 235 (Dec.89) 1 13. (Also in ACM TOCS).","DOI":"10.1145\/74850.74852"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"P-C Cheng and V. Gligor, On the formal specification and verification of a multiparty session protocol. IEEE Sym. on Research in Security and Privacy (1990), pp. 216\u2013233.","DOI":"10.1109\/RISP.1990.63853"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"D. Coppersmith, Another birthday attack. Crypto-85, pp. 14\u201317.","DOI":"10.1007\/3-540-39799-X_2"},{"key":"3_CR8","volume-title":"Cryptography and Data Security","author":"D. E. R. Denning","year":"1982","unstructured":"D. E. R. Denning, Cryptography and Data Security. Addison-Wesley, Reading, MA, 1982."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"D. E. Denning and G. M. Sacco, Timestamps in key distribution systems. CACM 248 (Aug.81) 533\u2013536.","DOI":"10.1145\/358722.358740"},{"key":"3_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Proc. of Crypto-86","author":"A. Fiat","year":"1987","unstructured":"A. Fiat and A. Shamir, How to Prove Yourself: practical solutions to identification and signature problems. Proc. of Crypto-86, Springer-Verlag LNCS 263, (1987) pp. 186\u2013194."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Z. Galil, S. Haber, and M. Yung, Symmetric Public-Key Cryptography. Crypto 85, pp. 128\u2013137.","DOI":"10.1007\/3-540-39799-X_12"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"O. Goldreich, A. Herzberg and Y. Mansour, Source to Destination Communication in the Presence of Faults. PODC 1989, pp. 85\u2013102.","DOI":"10.1145\/72981.72987"},{"key":"3_CR13","unstructured":"Data Encryption Standard, FIPS 46, NBS (Jan. 77).."},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali, Probabilistic encryption. J. Comp. Systems Sci. 28 (1984), pp. 270\u2013299.","journal-title":"J. Comp. Systems Sci."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham and R. Yahalom, Reasoning about belief in cryptographic protocols. IEEE Sym. on Research in Security and Privacy (1990), pp. 234\u2013248.","DOI":"10.1109\/RISP.1990.63854"},{"key":"3_CR16","unstructured":"Working Draft: Entity Authentication Using Symmetric Techniques. ISO Project JTCI.27.02.2(20.03.1.2) 06\/21\/1990."},{"key":"3_CR17","unstructured":"Banking-Key management (wholesale). ISO 8732, Geneva (1988)."},{"key":"3_CR18","unstructured":"OSI Directory-Part 8: Authentication Framework. ISO 9594-8, Geneva (1988)."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"J. J. Jueneman, S. M. Matyas, and C. H. Meyer, Message Authentication. IEEE Communication Magazine, pp. 29\u201340, 1985.","DOI":"10.1109\/MCOM.1985.1092643"},{"key":"3_CR20","volume-title":"Cryptographic protocols","author":"M. J. Merritt","year":"1983","unstructured":"M. J. Merritt, Cryptographic protocols. Ph.D. dissertation GIT-ICS-83\/06, The Georgia Institute of Technology, Atlanta, Ga., 1983"},{"key":"3_CR21","volume-title":"Cryptography: a new dimension in computer data security","author":"C. H. Meyer","year":"1982","unstructured":"C. H. Meyer and S. M. Matyas, Cryptography: a new dimension in computer data security. Willey, New York, 1982"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"M. Naor and M. Yung, Universal one-way hash functions and their cryptographic applications. ACM annual Symp. on Theory of Computing, 1989.","DOI":"10.1145\/73007.73011"},{"issue":"12","key":"3_CR23","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham, M. D. Schroeder, Using encryption for authentication in large networks of computers. CACM 2112 (1978) 993\u2013998.","journal-title":"CACM"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"D. Otway, O. Rees, Efficient and timely mutual authentication. ACM OSR 211 (Jan.87) 8\u201310.","DOI":"10.1145\/24592.24594"},{"key":"3_CR25","unstructured":"M. O. Rabin, Digital signature and public-key functions as intractable as factoring. MIT Tech. reprt TM-212 Lab. for Comp. Sci. (1979)."},{"issue":"2","key":"3_CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key crypto-systems. CACM 212 (1978) 120\u2013126 (and CACM 26 1 (1983) 96\u201399).","journal-title":"CACM"},{"key":"3_CR27","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/0169-7552(86)90004-8","volume":"11","author":"D.D. Sidhu","year":"1986","unstructured":"D.D. Sidhu, Authentication Protocols for Computer Networks: I. Computer Networks and ISDN Systems, 11, pages 297\u2013310, 1986.","journal-title":"Computer Networks and ISDN Systems"},{"key":"3_CR28","unstructured":"J. G. Steiner, et al., Kerberos: an authentication server for open network systems. Proc. Usenix Conf. (Winter 88)."},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"V.L. Voydoc and S.T. Kent, Security Mechanisms in High Level Network Protocols. Computing Surveys. 15 (1983).","DOI":"10.1145\/356909.356913"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:32Z","timestamp":1605647612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_3","relation":{},"subject":[]}}