Protocols for authentication and key establishment are the foundation for the security of communications; their range and diversity is immense, while their properties and vulnerabilities can vary greatly
Suitable for graduate students, researchers, and practitioners
In new edition the authors introduce chapters on computational models for key exchange and authentication, key agreement, the TLS protocol, ID-based protocols, and group key exchange
Includes new chapter on the TLS protocol, first academic text to explain the recently standardized TLS 1.3 protocol