{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:33:43Z","timestamp":1771025623302,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1992,6]]},"DOI":"10.1007\/bf00124891","type":"journal-article","created":{"date-parts":[[2004,10,31]],"date-time":"2004-10-31T15:50:19Z","timestamp":1099237819000},"page":"107-125","source":"Crossref","is-referenced-by-count":711,"title":["Authentication and authenticated key exchanges"],"prefix":"10.1007","volume":"2","author":[{"given":"Whitfield","family":"Diffie","sequence":"first","affiliation":[]},{"given":"Paul C.","family":"Van Oorschot","sequence":"additional","affiliation":[]},{"given":"Michael J.","family":"Wiener","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Information Technology?Security Techniques. Entity Authentication Mechanisms ? Part 3: Entity Authentication Using a Public-Key Algorithm (CD 9798-3), Nov. 199 (ISO\/IEC JTCI\/SC27 Committee Draft #4)."},{"key":"CR2","series-title":"Lecture Notes in Computer Science 434","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1007\/3-540-46885-4_6","volume-title":"How to keep authenticity alive in a computer network. Advances in Cryptology ? Eurocrypt 89","author":"F. Bauspiess","year":"1990","unstructured":"Bauspiess, F. and Knobloch, H.-J. 1990. How to keep authenticity alive in a computer network. Advances in Cryptology ? Eurocrypt 89, (J.J. Quisquater and J. Vandewalle, eds.) Lecture Notes in Computer Science 434: 38?46, Berlin\/New York: Springer-Verlag."},{"issue":"5","key":"CR3","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"S.M. Bellovin","year":"1990","unstructured":"Bellovin, S.M. and Merritt, M. 1990. Limitations of the Kerberos authentication system. ACM Computer Communication Review 20 (5):119?132.","journal-title":"ACM Computer Communication Review"},{"issue":"3","key":"CR4","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/BF00196726","volume":"4","author":"S. Bengio","year":"1991","unstructured":"Bengio, S., Brassard, G., Desmedt, Y.G., Coutier, C., Quisquater, J.-J. 1991. Secure implementation of identification system. J. Cryptology 4 (3):175?183.","journal-title":"J. Cryptology"},{"key":"CR5","unstructured":"Bird, R., Gopal, I., Herzberg, A., Janson, P., Kutten, S., Molva, R., and Yung, M. Forthcoming. Systematic design of two-party authentication protocols. Advances in Cryptology?Crypto '91, Berlin\/New York: Springer-Verlag."},{"key":"CR6","volume-title":"Modern Cryptology, Lecture Notes in Computer Science 325","author":"G. Brassard","year":"1988","unstructured":"Brassard, G. 1988. Modern Cryptology, Lecture Notes in Computer Science 325. Berlin\/New York: Springer-Verlag."},{"issue":"1","key":"CR7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., and Needham, R. 1990. A logic of authentication. ACM Transactions on Computer Systems 8 (1):18?36.","journal-title":"ACM Transactions on Computer Systems"},{"issue":"8","key":"CR8","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D.E. Denning","year":"1981","unstructured":"Denning, D.E. and Sacco, G.M. 1981. Timestamps in key distribution protocols. Comm. ACM 24 (8):533?536.","journal-title":"Comm. ACM"},{"issue":"6","key":"CR9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W. and Hellman, M.E. 1976. New directions in cryptography. IEEE Trans. Info. Theory IT-22 (6):644?654.","journal-title":"IEEE Trans. Info. Theory"},{"key":"CR10","unstructured":"(proposed U.S. FIPS) Digital Signature Standard (DSS), announced in Federal Register, vol. 56, no. 169 (Aug. 30, 1991), 42980?42982."},{"issue":"4","key":"CR11","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"IT-31","author":"T. ElGamal","year":"1988","unstructured":"ElGamal, T. 1988. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Info. Theory IT-31 (4):469?472.","journal-title":"IEEE Trans. Info. Theory"},{"key":"CR12","series-title":"Lecture Notes in Computer Science 263","first-page":"196","volume-title":"Advances in Cryptology?Crypto 86","author":"A. Fiat","year":"1987","unstructured":"Fiat, A. and Shamir, A. 1987. How to prove yourself: practical solutions to identification and signature problems. Advances in Cryptology?Crypto 86. (A. Odlyzko, ec.), Lecture Notes in Computer Science 263:196?194, Berlin\/New York: Springer-Verlag."},{"issue":"2","key":"CR13","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1007\/BF00196790","volume":"3","author":"K. Gaarder","year":"1991","unstructured":"Gaarder, K. and Snekkenes, E. 1991. Applying a formal analysis technique to CCITT X.509 strong two-way authentication protocol. J. Cryptology 3 (2):81?98.","journal-title":"J. Cryptology"},{"key":"CR14","series-title":"Lecture Notes in Computer Science 330","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-45961-8_11","volume-title":"Advances in Cryptology?Eurocrypt '88","author":"L.C. Guillou","year":"1988","unstructured":"Guillou, L.C. and Quisquater, J.-J. 1988. A practical zero-knowledge protocol fitted to security microprocessing minimizing both transmission and memory. Advances in Cryptology?Eurocrypt '88, C.G. G\u00fcnther, (ed.), Lecture Notes in Computer Science 330:123?128, Berlin\/New York: Springer-Verlag."},{"key":"CR15","series-title":"Lecture Notes in Computer Science 434","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-46885-4_5","volume-title":"Advances in Cryptology?Eurocrypt 89","author":"C.G. G\u00fcnther","year":"1990","unstructured":"G\u00fcnther, C.G. 1990. An identity-based key-exchange protocol. Advances in Cryptology?Eurocrypt 89, (J.-J. Quisquater and J. Vandewalle, eds.), Lecture Notes in Computer Science 434:29?37, Berlin\/New York: Springer-Verlag."},{"issue":"2","key":"CR16","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1991","unstructured":"Haber, S. and Stornetta, W.S. 1991. How to time-stamp a digital document. J. Cryptology 3 (2):99?111.","journal-title":"J. Cryptology"},{"issue":"2","key":"CR17","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/378570.378623","volume":"20","author":"C. I'Anson","year":"1990","unstructured":"I'Anson, C. and Michell, C. 1990. Security defects in CCITT Recommendation X.509?The Directory Authentication Framework. Computer Communication Review 20 (2):30?34.","journal-title":"Computer Communication Review"},{"key":"CR18","unstructured":"Kohl, J. and Neuman, B.C. 1991. The Kerberos network authentication service. MIT Project Athena Version 5."},{"issue":"17","key":"CR19","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1049\/el:19890801","volume":"25","author":"C. Mitchell","year":"1989","unstructured":"Mitchell, C. 1989. Limitations of challenge-response entity authentication. Electronic Letters 25 (17):195?196.","journal-title":"Electronic Letters"},{"issue":"5","key":"CR20","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/5.4444","volume":"76","author":"J.H. Moore","year":"1988","unstructured":"Moore, J.H. 1988. Protocol failures in cryptosystems. Proc. of the IEEE 76 (5):594?602.","journal-title":"Proc. of the IEEE"},{"key":"CR21","unstructured":"O'Higgins, B., Diffie, W., Strawczynski, L. and de Hoog, R. 1987. Encryption and ISDN?A Natural fit. In Proc. 1987 International Switching Symposium, Pheonix Arizona, pp. A1141-7."},{"issue":"4","key":"CR22","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/49.17711","volume":"7","author":"E. Okamoto","year":"1989","unstructured":"Okamoto, E. and Tanaka, K. 1989. Key distribution system based on identification information. IEEE J. Selected Areas in Comm. 7 (4):481?485.","journal-title":"IEEE J. Selected Areas in Comm."},{"key":"CR23","series-title":"Lecture Notes in Computer Science 209","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/3-540-39757-4_20","volume-title":"Advances in Cryptology?Eurocrypt 84","author":"A.M. Odlyzko","year":"1985","unstructured":"Odlyzko, A.M. 1985. Discrete logarithms in finite fields and their cryptographic significance. Advances in Cryptology?Eurocrypt 84, (T. Beth, N. Cot and I. Ingemarsson, eds.), Lecture Notes in Computer Science 209:224?314, Berlin,\/New York: Springer-Verlag."},{"issue":"1","key":"CR24","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/BF00123958","volume":"I","author":"B.A. LaMacchia","year":"1991","unstructured":"LaMacchia, B.A. and Odlyzko, A.M. 1991. Computation of discrete logarithms in prime fields. Designs, Codes and Cryptography I (1):47?62.","journal-title":"Designs, Codes and Cryptography"},{"key":"CR25","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"IT-24","author":"S.C. Pohlig","year":"1978","unstructured":"Pohlig, S.C. and Hellman, M. 1978. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24:106?110.","journal-title":"IEEE Transactions on Information Theory"},{"key":"CR26","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L. Shamir, A. and Adleman, L. 1978. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21:120?126.","journal-title":"Comm. ACM"},{"issue":"4","key":"CR27","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1145\/358027.358053","volume":"27","author":"R.L. Rivest","year":"1984","unstructured":"Rivest, R.L. and Shamir, A. 1984. How to expose an eavesdropper. Comm. ACM 27 (4):393?395.","journal-title":"Comm. ACM"},{"issue":"3","key":"CR28","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"C.P. Schnorr","year":"1990","unstructured":"Schnorr, C.P. 1990, 1991. Efficient signature generation by smart cards. J. Cryptology 4 (3):161?174; see also: Efficient identification and signatures for smart cards. Advances in Cryptology?Crypto 89, (G. Brassard, ed.), Lecture Notes in Computer Science 435:239?251, Berlin\/New York: Springer-Verlag.","journal-title":"J. Cryptology"},{"key":"CR29","series-title":"Lecture Notes in Computer Science 196","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology?Crypto 84","author":"A. Shamir","year":"1985","unstructured":"Shamir, A. 1985. Identity-based cryptosystems and signature schemes. Advances in Cryptology?Crypto 84, (G.R. Blakley and D. Chaum, ed.), Lecture Notes in Computer Science 196:47?53, Berlin\/New York: Springer-Verlag."},{"key":"CR30","unstructured":"CCITT Blue Book Recommendation X.509, The Directory-Authentication Framework. 1988. Geneva, March 1988; amended by resolution of Defect 9594\/016 (1Q 1991). Also ISO 9594-8."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00124891.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF00124891\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF00124891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,27]],"date-time":"2021-06-27T09:02:57Z","timestamp":1624784577000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF00124891"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,6]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1992,6]]}},"alternative-id":["BF00124891"],"URL":"https:\/\/doi.org\/10.1007\/bf00124891","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,6]]}}}