메뉴 건너뛰기




Volumn 1977, Issue , 2000, Pages 237-249

Two-pass authenticated key agreement protocol with key confirmation

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; NETWORK SECURITY;

EID: 84947720258     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44495-5_21     Document Type: Conference Paper
Times cited : (30)

References (23)
  • 3
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distributions – the Three Party Case
    • Springer-Verlag
    • M. Bellare and P. Rogaway, “Entity Authentication and Key Distributions – the Three Party Case”, Advances in Cryptology – Crypto ’93, 773, Springer-Verlag, pp232-249, 1994. 248
    • (1994) Advances in Cryptology – Crypto ’93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84955604812 scopus 로고    scopus 로고
    • Algorithms for Black-Box Fields and their Application to Cryptography
    • Springer-Verlag
    • D. Boneh and R. Lipton, “Algorithms for Black-Box Fields and their Application to Cryptography”, Advances in Cryptology – Crypto ’96, 1109, Springer-Verlag, pp 283-297, 1996. 239
    • (1996) Advances in Cryptology – Crypto ’96 , vol.1109 , pp. 283-297
    • Boneh, D.1    Lipton, R.2
  • 9
    • 0032635116 scopus 로고    scopus 로고
    • Scalar Multiplication on Elliptic Curves by Frobenius Expansions
    • J. Cheon, S. Park, C. Park and S. Hahn, “Scalar Multiplication on Elliptic Curves by Frobenius Expansions”, ETRI J., Vol.21, No.1, pp27-38, 1999. 243
    • (1999) ETRI J , vol.21 , Issue.1 , pp. 27-38
    • Cheon, J.1    Park, S.2    Park, C.3    Hahn, S.4
  • 15
    • 84958601057 scopus 로고    scopus 로고
    • A Key Recovery Attack on Discrete Log-based Schemes using a Prime Order Subgroup
    • Springer-Verlag
    • C. Lim and P. Lee, “A Key Recovery Attack on Discrete Log-based Schemes using a Prime Order Subgroup”, Advances in Cryptology – Crypto ’97, 1294, Springer-Verlag, pp249-263, 1997. 242
    • (1997) Advances in Cryptology – Crypto ’97 , vol.1294 , pp. 249-263
    • Lim, C.1    Lee, P.2
  • 17
    • 0022660635 scopus 로고
    • On Seeking Smart Public-Key Distribution Systems
    • T. Matsumoto, Y. Takashima and H. Imai, “On Seeking Smart Public-Key Distribution Systems”, Trans. Of IEICE, Vol.69, pp99-106, 1986. 240
    • (1986) Trans. Of IEICE , vol.69 , pp. 99-106
    • Matsumoto, T.1    Takashima, Y.2    Imai, H.3
  • 19
    • 0347124644 scopus 로고    scopus 로고
    • National Security Agency, Version 2.0, May 29
    • National Security Agency, “SKIPJACK and KEA Algorithm Specification”, Version 2.0, May 29, 1998. 240
    • (1998) SKIPJACK and KEA Algorithm Specification
  • 20
    • 0348250970 scopus 로고
    • A Key Distribution Paradox
    • Springer-Verlag
    • Y. Yacobi, “A Key Distribution Paradox”, Advances in Cryptology – Crypto ’90, 537, Springer-Verlag, pp268-273, 1991. 240
    • (1991) Advances in Cryptology – Crypto ’90 , vol.537 , pp. 268-273
    • Yacobi, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.