메뉴 건너뛰기




Volumn 26, Issue 4, 2004, Pages 371-374

On the security of an efficient two-pass key agreement protocol

Author keywords

Authentication; Cryptography; Key agreement; Key confirmation

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; NETWORK PROTOCOLS; SECURITY OF DATA; STANDARDS;

EID: 2042471479     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2003.11.007     Document Type: Article
Times cited : (4)

References (13)
  • 2
    • 2042417647 scopus 로고    scopus 로고
    • Public key cryptography for the financial services industry: Key agreement and key transport using Elliptic Curve cryptography. ANSI
    • June 15
    • ANSI X9.63, Public key cryptography for the financial services industry: Key agreement and key transport using Elliptic Curve cryptography. ANSI. Working draft. June 15, 2001.
    • (2001) Working Draft
  • 3
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • B. Preneel, Advances in Cryptology-Eurocrypt' 2000. Heidelberg: Springer-Verlag
    • Bellare M., Boldyreva A., Micali S. Public-key encryption in a multi-user setting: security proofs and improvements. Preneel B. Advances in Cryptology-Eurocrypt' 2000. Lecture notes in Computer Science. vol. 1807:2000;259-274 Springer-Verlag, Heidelberg.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 4
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Proc. of the sixth IMA International Conference on Cryptography and Coding
    • Blake-Wilson S., Johnson D., Menezes A. Key agreement protocols and their security analysis. Proc. of the sixth IMA International Conference on Cryptography and Coding Lecture Notes in Computer Science. vol. 1355:1997;30-45.
    • (1997) Lecture Notes in Computer Science , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 8
    • 67649746889 scopus 로고    scopus 로고
    • An unknown key-share attack on the MQV key agreement protocol
    • Kaliski B. An unknown key-share attack on the MQV key agreement protocol. ACM Trans. Inf. Syst. Secur. 4(3):2001;275-288.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 275-288
    • Kaliski, B.1
  • 9
    • 74549221711 scopus 로고    scopus 로고
    • An efficient ptotocol for authenticated key agreement
    • Department of C and O, University of Waterloo, Tech. Rep. COPR98-05, 1998
    • Law L., Menezes A., Qu M., Solinas J., Vanstone S. An efficient ptotocol for authenticated key agreement, Department of C and O, University of Waterloo. Tech. Rep. COPR98-05, 1998 Designs Codes Cryptogr. 28(2):2003;119-134. Available: http://grouper.ieee.org/groups/1363/.
    • (2003) Designs Codes Cryptogr. , vol.28 , Issue.2 , pp. 119-134
    • Law, L.1    Menezes, A.2    Qu, M.3    Solinas, J.4    Vanstone, S.5
  • 12
    • 0347124644 scopus 로고    scopus 로고
    • NIST, Federal Information Processing Standards (FIPS-185) May 1998
    • National Security Agency SKIPJACK and KEA Algorithm Specification, Version 2.0, NIST, Federal Information Processing Standards (FIPS-185) May 1998. 1998;. Available: http://csrc.nist.gov/encryption/skipjack-kea.html.
    • (1998) SKIPJACK and KEA Algorithm Specification, Version 2.0
  • 13
    • 0036643547 scopus 로고    scopus 로고
    • Robust generalized MQV key agreement protocol without using one-way hash functions
    • Tseng Y.M. Robust generalized MQV key agreement protocol without using one-way hash functions. Comput. Stand. Interfaces. 24(3):2002;241-246
    • (2002) Comput. Stand. Interfaces , vol.24 , Issue.3 , pp. 241-246
    • Tseng, Y.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.