메뉴 건너뛰기




Volumn , Issue , 2006, Pages 50-60

Elliptic curve and password based dynamic key agreement in wireless ad-hoc networks

Author keywords

Disaster management; Elliptic curves; MANET security

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC DATA INTERCHANGE; INTERCONNECTION NETWORKS; INTRUSION DETECTION; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY;

EID: 38049127352     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 5
  • 6
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, volume 4 8, pages 203-209, 1987.
    • (1987) Mathematics of Computation , vol.4 , Issue.8 , pp. 203-209
    • Koblitz, N.1
  • 7
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, and L. M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21, 2, 120-126, Feb 1978.
    • R. Rivest, A. Shamir, and L. M. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21, 2, 120-126, Feb 1978.
  • 9
    • 35048833769 scopus 로고    scopus 로고
    • A. Menezes, E. Teske, and A. Weng. Weak Fields for ECC In T. Okamoto, editor, Topics in Cryptology CTRSA 2004, LNCS 2964, pages 366{386. Springer, 2004.
    • A. Menezes, E. Teske, and A. Weng. Weak Fields for ECC In T. Okamoto, editor, Topics in Cryptology CTRSA 2004, volume LNCS 2964, pages 366{386. Springer, 2004.
  • 10
    • 38049110174 scopus 로고    scopus 로고
    • D. Johnson and S. Vanstone, The elliptic curve digital signature algorithm (ECDSA) (with D. Johnson and S. Vanstone) International Journal on Information Security, 1 (2001), 36-63
    • D. Johnson and S. Vanstone, The elliptic curve digital signature algorithm (ECDSA) (with D. Johnson and S. Vanstone) International Journal on Information Security, 1 (2001), 36-63
  • 11
    • 38049180923 scopus 로고    scopus 로고
    • Weak keys of pairing based Diffie Hellman schemes on elliptic curves
    • A. A. Kalele, V. R. Sule, Weak keys of pairing based Diffie Hellman schemes on elliptic curves, Cryptology ePrint Archive 2005/30, 2005
    • (2005) Cryptology ePrint Archive , vol.30
    • Kalele, A.A.1    Sule, V.R.2
  • 12
    • 0036867644 scopus 로고    scopus 로고
    • Journal of Computer Science and Technology archive, Volume 17, Issue 6 (November 2002) table of contents Pages: 749-756
    • Dong Zheng, Kefei Chen, Jinyuan You, Multiparty authentication services and key agreement protocols with semi-trusted third party, Journal of Computer Science and Technology archive, Volume 17, Issue 6 (November 2002) table of contents Pages: 749-756, 2002
    • (2002)
    • Zheng, D.1    Chen, K.2    You, J.3
  • 15
    • 38049141004 scopus 로고    scopus 로고
    • Daniel Brown Conjectured Security of the ANSINIST Elliptic Curve RNG, CACR 2006-11, 2006
    • Daniel Brown Conjectured Security of the ANSINIST Elliptic Curve RNG, CACR 2006-11, 2006


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.