next up previous
Next: About this document Up: The TESLA Broadcast Authentication Previous: Acknowledgments

ifundefinedsend ifundefinedxor ifundefinedrandom

References

1
R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham. A new family of authentication protocols. ACM Operating Systems Review, 32(4):9-20, October 1998.

2
F. Bergadano, D. Cavagnino, and B. Crispo. Chained stream authentication. In Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, volume 2012 of Lecture Notes in Computer Science, pages 144-157, August 2000.

3
F. Bergadano, D. Cavalino, and B. Crispo. Individual single source authentication on the mbone. In ICME 2000, Aug 2000.

4
D. Boneh, G. Durfee, and M. Franklin. Lower bounds for multicast message authentication. In Advances in Cryptology -- EUROCRYPT '2001, volume 2045 of Lecture Notes in Computer Science, pages 434-450, 2001.

5
B. Briscoe. FLAMeS: Fast, Loss-Tolerant Authentication of Multicast Streams. Technical report, BT Research, 2000. http://www.labs.bt.com/people/briscorj/papers.html.

6
A. Buldas, P. Laud, H. Lipmaa, and J. Villemson. Time-stamping with binary linking schemes. In Advances in Cryptology -- CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 486-501, 1998.

7
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In INFOCOMM'99, pages 708-716, March 1999.

8
S. Cheung. An efficient message authentication scheme for link state routing. In 13th Annual Computer Security Applications Conference, pages 90-98, 1997.

9
D. Coppersmith and M. Jakobsson. Almost optimal hash sequence traversal. In Proceedings of the Fourth Conference on Financial Cryptography (FC '02), Lecture Notes in Computer Science, 2002.

10
Y. Desmedt and Y. Frankel. Shared generation of authenticators and signatures. In Advances in Cryptology -- CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 457-469, 1992.

11
Y. Desmedt, Y. Frankel, and M. Yung. Multi-receiver / multi-sender network security: Efficient authenticated multicast / feedback. In Proceedings IEEE Infocom '92, pages 2045-2054, 1992.

12
Y. Desmedt and M. Yung. Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attacks. In Advances in Cryptology -- CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 177-188, 1991.

13
F. Fujii, W. Kachen, and K. Kurosawa. Combinatorial bounds and design of broadcast authentication. IEICE Transactions, E79-A(4):502-506, 1996.

14
R. Gennaro and P. Rohatgi. How to sign digital streams. In Advances in Cryptology -- CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 180-197, 1997.

15
S. Haber and W. Stornetta. How to time-stamp a digital document. In Advances in Cryptology -- CRYPTO '90, volume 537 of Lecture Notes in Computer Science, pages 437-455, 1991.

16
N. Haller. The S/Key one-time password system. In Proceedings of the Symposium on Network and Distributed Systems Security, pages 151-157. Internet Society, February 1994.

17
H. Holbrook and D. Cheriton. IP multicast channels: EXPRESS support for large-scale single-source applications. In Proceedings of ACM SIGCOMM '99, September 1999.

18
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking (Mobicom 2002), September 2002. To appear.

19
M. Jakobsson. Fractal hash sequence representation and traversal. In Proceedings of the 2002 IEEE International Symposium on Information Theory (ISIT '02), pages 437-444, July 2002.

20
K. Kurosawa and S. Obana. Characterization of (k,n) multi-receiver authentication. In Proceedings of the 2nd Australasian Conference on Information Security and Privacy (ACISP '97), volume 1270 of Lecture Notes in Computer Science, pages 205-215, 1997.

21
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, November 1981.

22
L. Lamport and P. Melliar-Smith. Synchronizing clocks in the presence of faults. Journal of the ACM, 32(1):52-78, 1985.

23
H. Lipmaa. Secure and Efficient Time-Stamping Systems. PhD thesis, Department of Mathematics, University of Tartu, Estonia, April 1999.

24
D. Mills. Network Time Protocol (version 3) specification, implementation and analysis. Internet Request for Comment RFC 1305, Internet Engineering Task Force, March 1992.

25
S. Miner and J. Staddon. Graph-based authentication of digital streams. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 232-246, May 2001.

26
Multicast security ietf working group (msec). http://www.ietf.org/html.charters/msec-charter.html, 2002.

27
A. Perrig, R. Canetti, D. Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), pages 35-46. Internet Society, February 2001.

28
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. Efficient authentication and signature of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 56-73, May 2000.

29
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks (Mobicom 2001), pages 189-199, 2001.

30
A. Perrig and J. D. Tygar. Security Protocols for Broadcast Networks. Kluwer Academic Publishers, 2002. To appear.

31
M. Reiter. A security architecture for fault-tolerant systems. PhD thesis, Department of Computer Science, Cornell University, August 1993.

32
M. Reiter, K. Birman, and R. van Renesse. A security architecture for fault-tolerant systems. ACM Transactions on Computer Systems, 12(4):340-371, November 1994.

33
P. Rohatgi. A compact and fast hybrid signature scheme for multicast packet. In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 93-100, November 1999.

34
R. Safavi-Naini and H. Wang. New results on multireceiver authentication codes. In Advances in Cryptology -- EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 527-541, 1998.

35
R. Safavi-Naini and H. Wang. Multireceiver authentication codes: Models, bounds, constructions and extensions. Information and Computation, 151(1/2):148-172, 1999.

36
G. Simmons. A cartesian product construction for unconditionally secure authentication codes that permit arbitration. Journal of Cryptology, 2(2):77-104, 1990.

37
B. Simons, J. Lundelius-Welch, and N. Lynch. An overview of clock synchronization. In B. Simons and A. Spector, editors, Fault-Tolerant Distributed Computing, number 448 in LNCS, pages 84-96, 1990.

38
D. Song, D. Zuckerman, and J. D. Tygar. Expander graphs for digital stream authentication and robust overlay networks. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 258-270, May 2002.

39
C. Wong and S. Lam. Digital signatures for flows and multicasts. In IEEE ICNP `98, 1998.

40
Source-Specific Multicast IETF working group (SSM). http://www.ietf.org/html.charters/ssm-charter.html, 2002.


next up previous
Next: About this document Up: The TESLA Broadcast Authentication Previous: Acknowledgments

Adrian Perrig
Mon Aug 5 22:55:55 PDT 2002