refactoring crypto handshakes (SSL in 3 easy steps)

Steven M. Bellovin smb at cs.columbia.edu
Tue Nov 13 22:06:56 EST 2007


There was a paper by Li Gong at an early CCS -- '93, I think, though it
might have been '94 -- on the number of messages different types of
authentication protocol took.  It would be a good starting point.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list