View : 566 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author심경아-
dc.date.accessioned2016-08-28T12:08:36Z-
dc.date.available2016-08-28T12:08:36Z-
dc.date.issued2007-
dc.identifier.issn0916-8508-
dc.identifier.otherOAK-3792-
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/219808-
dc.description.abstractJohnston and Gemmell proposed an authenticated key exchange protocol based on the difficulty of the q-th root problem. They showed that it is provably secure against man-in-the-middle attacks. In this paper we show that the protocol is insecure against an unknown key-share attack and does not achieve forward secrecy. © 2007 The Institute of Electronics, Information and Communication Engineers.-
dc.languageEnglish-
dc.titleSecurity analysis of authenticated key exchange protocol based on the q-th root problem-
dc.typeConference Paper-
dc.relation.issue1-
dc.relation.volumeE90-A-
dc.relation.indexSCOPUS-
dc.relation.startpage231-
dc.relation.lastpage233-
dc.relation.journaltitleIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences-
dc.identifier.doi10.1093/ietfec/e90-a.1.231-
dc.identifier.wosidWOS:000243703300025-
dc.identifier.scopusid2-s2.0-33846411512-
dc.author.googleShim K.-A.-
dc.date.modifydate20200911081002-
Appears in Collections:
자연과학대학 > 수학전공 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE