메뉴 건너뛰기




Volumn E83-A, Issue 12, 2000, Pages 2766-2769

Remarks on the unknown key share attacks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0034498689     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (18)

References (13)
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols,"
    • M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach to the design and analysis of authentication and key exchange protocols," Proc. Annual Symposium on the Theory of Computing, 1998, (http://www-cse.ucsd.edu/users/mihir).
    • Proc. Annual Symposium on the Theory of Computing, 1998
    • Bellare, M.1
  • 9
    • 33749935294 scopus 로고    scopus 로고
    • "Information technology-security techniques-key management-Part 3: Mechanisms using asymmetric techniques,"
    • ISO/IEC 11770-3
    • ISO/IEC 11770-3, "Information technology-security techniques-key management-Part 3: Mechanisms using asymmetric techniques," Final Text for Publication, 1999.
    • Final Text for Publication, 1999.
  • 12
    • 0017930809 scopus 로고    scopus 로고
    • A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems,"
    • R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol.21, pp.120-126, 1978.
    • Commun. ACM, Vol.21, Pp.120-126, 1978.
    • Rivest, R.L.1
  • 13
    • 3042666549 scopus 로고    scopus 로고
    • "On formal models for secure key exchange,"
    • V. Shoup, "On formal models for secure key exchange," IBM Research Report RZ 3120, 1999, Available at http://uuw.shoup.net/papers
    • IBM Research Report RZ 3120, 1999
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.