{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T03:15:58Z","timestamp":1773717358605,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540406747","type":"print"},{"value":"9783540451464","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45146-4_24","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T21:51:19Z","timestamp":1277243479000},"page":"400-425","source":"Crossref","is-referenced-by-count":216,"title":["SIGMA: The \u2018SIGn-and-MAc\u2019 Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols"],"prefix":"10.1007","author":[{"given":"Hugo","family":"Krawczyk","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Aiello, B., Bellovin, S., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A., Reingold, O.: Efficient, DoS-Resistant Secure Key Exchange for Internet Protocols. ACM Computers and Communications Security conference, CCS (2002), http:\/\/www.research.att.com\/~smb\/papers\/jfk-ccs.pdf","DOI":"10.1007\/3-540-45807-7_5"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"24_CR3","unstructured":"Bellovin, S.M.: Problem Areas for the IP Security Protocols., In: Proceedings of the Sixth Usenix Unix Security Symposium (1996)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-49162-7_12","volume-title":"Public Key Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to- station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 154\u2013170. Springer, Heidelberg (1999)"},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic for authentication. ACM Trans. Computer Systems\u00a08, 18\u201336 (1990)","journal-title":"ACM Trans. Computer Systems"},{"key":"#cr-split#-24_CR6.1","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.??2045, p. 453. Springer, Heidelberg (2001);","DOI":"10.1007\/3-540-44987-6_28"},{"key":"#cr-split#-24_CR6.2","unstructured":"Full version in: Cryptology ePrint Archive, Report 2001\/040, http:\/\/eprint.iacr.org\/"},{"key":"#cr-split#-24_CR7.1","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Security Analysis of IKE???s Signature-based Key- Exchange Protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.??2442, p. 143. Springer, Heidelberg (2002);","DOI":"10.1007\/3-540-45708-9_10"},{"key":"#cr-split#-24_CR7.2","unstructured":"Full version in: Cryptology ePrint Archive, Report 2002\/120, http:\/\/eprint.iacr.org\/"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Diffie, W., van Oorschot, P., Wiener, M.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography\u00a02, 107\u2013125 (1992), Available at http:\/\/www.scs.carleton.ca\/~paulv\/papers\/sts-final.ps","DOI":"10.1007\/BF00124891"},{"key":"24_CR9","unstructured":"Ferguson, N., Schneier, B.: A Cryptographic Evaluation of IPSec (1999), http:\/\/www.counterpane.com\/ipsec.html"},{"key":"24_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge Press, New York (2001)"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D. (eds.): The Internet Key Exchange (IKE), RFC 2409 (November 1998)","DOI":"10.17487\/rfc2409"},{"key":"24_CR12","unstructured":"ISO\/IEC, I.S.: 9798-3, Entity authentication mechanisms \u2014 Part 3: Entity authentication using asymmetric techniques (1993)"},{"key":"24_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/3-540-44987-6_32","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"C. Jutla","year":"2001","unstructured":"Jutla, C.: Encryption Modes with Almost Free Message Integrity. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 529. Springer, Heidelberg (2001)"},{"key":"24_CR14","unstructured":"Karn, P., Simpson, W.A.: The Photuris Session Key Management Protocol, draft-ietf-ipsec-photuris-03.txt (September 1995)"},{"issue":"3","key":"24_CR15","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/501978.501981","volume":"4","author":"B. Kaliski","year":"2001","unstructured":"Kaliski, B.: An unknown key-share attack on the MQV key agreement protocol. ACM Transactions on Information and System Security (TISSEC)\u00a04(3), 275\u2013288 (2001)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"24_CR16","unstructured":"Kaufman, C.: Internet Key Exchange (IKEv2) Protocol, draft-ietf-ipsec-ikev2- 07.txt (to be published as an RFC) (April 2003)"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, Request for Comments 2401 (November 1998)","DOI":"10.17487\/rfc2401"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Encapsulating Security Payload (ESP), Request for Comments 2406 (November 1998)","DOI":"10.17487\/rfc2406"},{"key":"24_CR19","unstructured":"Krawczyk, H.: Communication to IPsec WG, IPsec mailing list archives, (April-October 1995), http:\/\/www.vpnc.org\/ietf-ipsec\/"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: SKEME: A Versatile Secure Key Exchange Mechanism for Internet. In: Proceedings of the 1996 Internet Society Symposium on Network and Distributed System Security, pp. 114\u2013127 (February 1996) http:\/\/www.ee.technion.ac.il\/~hugo\/skeme-lncs.ps","DOI":"10.1109\/NDSS.1996.492418"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-Hashing for Message Authentication, RFC 2104 (February 1997)","DOI":"10.17487\/rfc2104"},{"key":"24_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/3-540-48390-X_2","volume-title":"Financial Cryptography","author":"H. Krawczyk","year":"1999","unstructured":"Krawczyk, H.: Blinding of Credit Card Numbers in the SET Protocol. In: Franklin, M.K. (ed.) FC 1999. LNCS, vol.\u00a01648, p. 17. Springer, Heidelberg (1999)"},{"key":"#cr-split#-24_CR23.1","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: The order of encryption and authentication for protecting communications (Or: how secure is SSL?) In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.??2139, p. 310. Springer, Heidelberg (2001);","DOI":"10.1007\/3-540-44647-8_19"},{"key":"#cr-split#-24_CR23.2","doi-asserted-by":"crossref","unstructured":"Report 2001\/045, Full version in: Cryptology ePrint Archive Report 2001\/045, http:\/\/eprint.iacr.org\/","DOI":"10.1088\/1126-6708\/2001\/07\/045"},{"key":"24_CR24","unstructured":"Krawczyk, H.: SIGMA: the \u2018SIGn-and-MAc\u2019 Approach to Authenticated Diffie- Hellman and its Use in the IKE Protocols, full version, http:\/\/www.ee.technion.ac.il\/~hugo\/sigma.html"},{"key":"24_CR25","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/CSFW.1996.503701","volume-title":"9th IEEE Computer Security Foundations Workshop","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Some New Attacks upon Security Protocols. In: 9th IEEE Computer Security Foundations Workshop, pp. 162\u2013169. IEEE Press, Los Alamitos (1996)"},{"key":"24_CR26","volume-title":"Proc. of the 1999 IEEE Symposium on Security and Privacy","author":"C. Meadows","year":"1999","unstructured":"Meadows, C.: Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer. In: Proc. of the 1999 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"24_CR27","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Orman, H.: The OAKLEY Key Determination Protocol, Request for Comments 2412 (November 1998)","DOI":"10.17487\/rfc2412"},{"key":"24_CR29","volume-title":"WET-ICE Security Conference","author":"R. Perlman","year":"2001","unstructured":"Perlman, R., Kaufman, C.: Analysis of the IPsec key exchange Standard. In: WET-ICE Security Conference. MIT, Cambridge (2001)"},{"key":"24_CR30","unstructured":"Shoup, V.: On Formal Models for Secure Key Exchange, Theory of Cryptography Library (1999), Available at: http:\/\/philby.ucsd.edu\/cryptolib\/1999\/99-12.html"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"van Oorschot, P.: Extending cryptographic logics of belief to key agreement protocols. In: Proceedings, 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, pp. 232\u2013243 (November 1993)","DOI":"10.1145\/168588.168617"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - CRYPTO 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45146-4_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T05:06:02Z","timestamp":1740200762000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45146-4_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406747","9783540451464"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45146-4_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003]]}}}