Name 
Abstract 
Andrew Secure RPC 
Exchanged of a fresh shared key.
Symmetric key cryptography.

BAN modified Andrew Secure RPC 
Modified version of Andrew Secure RPC correcting
a freshness flaw.
Exchanged of a fresh shared key,
Symmetric key cryptography.

BAN concrete Andrew Secure RPC 
A concrete realization of the Andrew Secure RPC protocol,
stronger and with less encryption.
Exchanged of a fresh shared key,
Symmetric key cryptography.

Lowe modified BAN concrete Andrew Secure RPC 
A modified version of the BAN concrete Andrew Secure RPC protocol,
preventing a parallel session attack.
Exchanged of a fresh shared key,
Symmetric key cryptography.

Bull's Authentication Protocol 
This protocol, described in [bull97], aims at establishing fresh
session keys between a fixed number of participants (for instance 3) and a server: one
key for each pair of agents adjacent in the chain.

CAM 
A protocol used by mobile computers to inform their peers when their
network address has changed.

CCITT X.509 (1) 
One message protocol from the recommendations of the CCITT for the CCITT.X.509 standard.

CCITT X.509 (1c) 
Correction of the CCITT X.509 (1) one message protocol.

CCITT X.509 (3) 
Three messages protocol in the recommendations of the CCITT for the CCITT.X.509 standard.

BAN modified version of CCITT X.509 (3) 
Modified version of the three messages protocol
in the recommendations of the CCITT for the CCITT.X.509 standard
(CCITT X.509 (3)).

DenningSacco shared key 
Modified version of the Needham Schroeder Symmetric Key with
timestamps to fix the freshness flaw.
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server and timestamps.

Lowe modified DenningSacco shared key 
Modified version of the DenningSacco shared key protocol
to correct a freshness flaw.
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server and timestamps.

Diffie Helman 
The Diffie Helman key exchange algorithm.

GJM 
The goal of this protocol is to achieve distributed contract signing in an abusefree way, that is no party ever can prove to a third party that he is able of determining the issue of the exchange (validate or invalidate the contract). To achieve this goal, a special construction called private contract signature is introduced. Such a private contract signature has the particular property that it is meaningful only for a given trusted third party. Moreover, this protocol is optimistic in the sense that the trusted third party is required only in case of problem.

Gong 
Mutual authentication protocol of two principals with a trusted
server, and exchange of a new symmetric key.
Uses oneway functions and no encryption.

Kao Chow Authentication v.1 
Key distribution and authentication protocol.
Symmetric keys cryptography with server.

Kao Chow Authentication v.2 
Key distribution and authentication protocol.
Symmetric keys cryptography with server.

Kao Chow Authentication v.3 
Key distribution and authentication protocol.
Symmetric keys cryptography with server.

Kerberos V5 
Distribution of a symmetric key (in a ticket),
for communication between a client and a server,
with authentication.

KSL 
Nonce based improvement of Kerberos V5 protocol
with generalized timestamps.
Distribution of a session key and a ticket and
repeated mutual authentication.
Symmetric key cryptography with server.

Lowe modified KSL 
Lowe modified version of the KSL protocol
to prevent authentication attacks.
Distribution of a session key and a ticket and
repeated mutual authentication.
Symmetric key cryptography with server.

Neumann Stubblebine 
Session key exchange inspired by the Yahalom protocol
with the addition of timestamps, and mutual authentication.
Symmetric key cryptography with server.

Hwang modified version of Neumann Stubblebine 
Modified version of the Neumann Stubblebine
protocol, to correct attack of the repeated authentification part.

NeedhamSchroeder Public Key 
Mutual authentication, using a trusted key server and public keys.

Lowe's fixed version of NeedhamSchroder Public Key 
This protocol is an amended version of the NeedhamSchroeder Public Key.
Its purpose id mutual authentication, using a trusted keyserver and public keys. 
Needham Schroeder Symmetric Key 
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server.

Amended Needham Schroeder Symmetric Key 
This is an amended version of Needham Schroeder Symmetric Key, by the same authors.
Distribution of a shared symmetric key by a trusted server
and mutual authentification.
Symmetric key cryptography with server.

Otway Rees 
Distribution of a shared symmetric key by a trusted server.
Symmetric key cryptography with server.

Schnorr's Protocol 
The Schnorr protocol is described by R. Cramer,
I. Damgård and B. Schoenmakers in [BRICSEP94CDS_PPKS].

ShamirRivestAdleman Three Pass Protocol 
The following protocol, described in [ClarkJacob97], allows two principals
to exchange a secret message without sharing any initial secret. 
SK3 
Symmetric key distribution using Smart Cards, by Shoup and Rubin.

SmartRight viewonly 
This viewonly protocol is part of the SmartRight
system designed by Thomson for copy protection
for the Digital Video Broadcasting technology.
Its purpose is to ensure that the digital content
broadcasted can be view only once.
It uses symmetric key cryptography with nonces and xor.

SPLICE/AS 
Mutual authentication protocol.
Public key cryptography
with a certification authority
signing and distributing public keys.

Hwang and Chen modified SPLICE/AS 
This modified version correct two flaws in SPLICE/AS.
Mutual authentication protocol with
public key cryptography
with a certification authority
signing and distributing public keys.

Clark and Jacob modified Hwang and Chen modified SPLICE/AS 
This modified version corrects a flaws in Hwang and Chen modified SPLICE/AS.
Mutual authentication protocol with
public key cryptography
with a certification authority
signing and distributing public keys.

TMN 
Distribution of a fresh symmetric key and authentication.
Symmetric keys, trusted server and
public keys (only the public key of the server is used).

Wired Equivalent Privacy Protocol 
The Wired Equivalent Privacy (WEP) protocol, described in [802.11], is
used to protect data during wireless transmission.

Wide Mouthed Frog 
Distribution of a fresh shared key.
Symmetric key cryptography with server and timestamps.

Lowe modified Wide Mouthed Frog 
An modified version of Wide Mouthed Frog.
Exchanged of a fresh shared key.
Symmetric key cryptography with server and timestamps.

Woo and Lam Mutual Authentication 
Key distribution and mutual authentication with trusted server and symmetric keys.

Woo and Lam Pi 
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi 3, Woo and Lam Pi 2,
Woo and Lam Pi 1, and Woo and Lam Pi f.

Woo and Lam Pi 1 
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi f.

Woo and Lam Pi 2 
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi 1 and Woo and Lam Pi f.

Woo and Lam Pi 3 
One way authentification protocol with
public keys and trusted server,
simplification of Woo and Lam Pi 2, Woo and Lam Pi 1,
and Woo and Lam Pi f.

Woo and Lam Pi f 
One way authentification protocol with
public keys and trusted server.

Yahalom 
Distribution of a fresh symmetric shared key by
a trusted server and mutual authentication.
Symmetric keys and trusted server.

BAN simplified version of Yahalom 
An amended version of the Yahalom protocol,
presented in the BAN logic paper.
Symmetric keys and trusted server.

Lowe's modified version of Yahalom 
Lowe's modified version of the Yahalom protocol.
Symmetric keys and trusted server.

Paulson's strengthened version of Yahalom 
Paulson's modified version of the Yahalom protocol.
Symmetric keys and trusted server.
