메뉴 건너뛰기




Volumn 3, Issue 3, 2006, Pages 290-295

Attacks on an ISO/IEC 11770-2 key establishment protocol

Author keywords

Cryptanalysis; Cryptography; Key establishment protocol

Indexed keywords

CRYPTANALYSIS; ISO/IEC; KEY ESTABLISHMENT PROTOCOL; REPLAY ATTACK;

EID: 77950665222     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (9)
  • 5
    • 33751574051 scopus 로고    scopus 로고
    • Attacking authentication protocols
    • Aug
    • J. Clark and J. Jacob, "Attacking authentication protocols," High Integrity Systems, vol. 1, no. 5, pp. 465-473, Aug. 1996.
    • (1996) High Integrity Systems , vol.1 , Issue.5 , pp. 465-473
    • Clark, J.1    Jacob, J.2
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Aug
    • D. E. Denning and G. M. Sacco, "Timestamps in key distribution protocols," Communications of the ACM, vol. 24, vol. 8, pp. 533-536, Aug. 1981.
    • (1981) Communications of the ACM , vol.8-24 , pp. 533-536
    • Denning, D.E.1    Sacco, G.M.2
  • 9
    • 0024715186 scopus 로고
    • Limitations of challenge-response entity authentication
    • C. J. Mitchell, "Limitations of challenge-response entity authentication," Electronics Letters, vol. 25, pp. 1195-1196, 1989.
    • (1989) Electronics Letters , vol.25 , pp. 1195-1196
    • Mitchell, C.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.