메뉴 건너뛰기




Volumn 2, Issue 2, 2010, Pages 154-158

On reusing ephemeral keys in Diffie-Hellman key agreement protocols

Author keywords

Diffie Hellman; Key agreement protocols

Indexed keywords


EID: 84857829372     PISSN: 17530563     EISSN: 17530571     Source Type: Journal    
DOI: 10.1504/IJACT.2010.038308     Document Type: Article
Times cited : (22)

References (23)
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R. and Krawczyk, H. (2001) 'Analysis of key-exchange protocols and their use for building secure channels', in Pfitzmann, B. (Ed.): Advances in Cryptology - EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, pp.453-474, Springer-Verlag, available athttp://eprint.iacr.org/2001/040/. (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 14
    • 33745179557 scopus 로고    scopus 로고
    • HMQV: A high-performance secure Diffie-Hellman protocol
    • in Shoup, V. (Ed.), Springer-txt Verlag
    • Krawczyk, H. (2005) 'HMQV: a high-performance secure Diffie-Hellman protocol', in Shoup, V. (Ed.): Advances in Cryptology - CRYPTO 2005, Lecture Notes in Computer Science, Vol. 3621, pp.546-566, Springer-Verlag, available athttp://eprint.iacr.org/2005/176/.
    • (2005) Advances in Cryptology - CRYPTO 2005 Lecture Notes in Computer Science , vol.3621 , pp. 546-566
    • Krawczyk, H.1
  • 15
    • 84857846599 scopus 로고    scopus 로고
    • HMQV in IEEE P1363
    • 7 July
    • Krawczyk, H. (2006) 'HMQV in IEEE P1363', Submission to the IEEE P1363 working group, 7 July, available at http://grouper.ieee.org/groups/1363/P1363- Reaffirm/submissions/ krawczyk-hmqv-spec.pdf.
    • (2006) Submission to the IEEE P1363 Working Group
    • Krawczyk, H.1
  • 17
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • in Kaliski, B. (Ed.), Springer-Verlag
    • Lim, C. and Lee, P. (1997) 'A key recovery attack on discrete log-based schemes using a prime order subgroup', in Kaliski, B. (Ed.): Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science, Vol. 1294, pp.249-263, Springer-Verlag.
    • (1997) : Advances in Cryptology - CRYPTO '97, Lecture Notes in Computer Science , vol.1294 , pp. 249-263
    • Lim, C.1    Lee, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.