Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 심경아 | - |
dc.date.accessioned | 2016-08-28T12:08:36Z | - |
dc.date.available | 2016-08-28T12:08:36Z | - |
dc.date.issued | 2007 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.other | OAK-3792 | - |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/219808 | - |
dc.description.abstract | Johnston and Gemmell proposed an authenticated key exchange protocol based on the difficulty of the q-th root problem. They showed that it is provably secure against man-in-the-middle attacks. In this paper we show that the protocol is insecure against an unknown key-share attack and does not achieve forward secrecy. © 2007 The Institute of Electronics, Information and Communication Engineers. | - |
dc.language | English | - |
dc.title | Security analysis of authenticated key exchange protocol based on the q-th root problem | - |
dc.type | Conference Paper | - |
dc.relation.issue | 1 | - |
dc.relation.volume | E90-A | - |
dc.relation.index | SCOPUS | - |
dc.relation.startpage | 231 | - |
dc.relation.lastpage | 233 | - |
dc.relation.journaltitle | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | - |
dc.identifier.doi | 10.1093/ietfec/e90-a.1.231 | - |
dc.identifier.wosid | WOS:000243703300025 | - |
dc.identifier.scopusid | 2-s2.0-33846411512 | - |
dc.author.google | Shim K.-A. | - |
dc.date.modifydate | 20200911081002 | - |