refactoring crypto handshakes (SSL in 3 easy steps)
Steven M. Bellovin
smb at cs.columbia.edu
Tue Nov 13 22:06:56 EST 2007
There was a paper by Li Gong at an early CCS -- '93, I think, though it
might have been '94 -- on the number of messages different types of
authentication protocol took. It would be a good starting point.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list