NL repository
menu
검색
Library
Browse
Communities & Collections
By Date
Authors
Titles
Subject
My Repository
My Account
Receive email updates
Edit Profile
DSpace at EWHA
자연과학대학
수학전공
Journal papers
View : 560 Download: 0
Security analysis of authenticated key exchange protocol based on the q-th root problem
Title
Security analysis of authenticated key exchange protocol based on the q-th root problem
Authors
Shim K.-A.
Ewha Authors
심경아
Issue Date
2007
Journal Title
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
ISSN
0916-8508
Citation
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences vol. E90-A, no. 1, pp. 231 - 233
Indexed
SCOPUS
Document Type
Conference Paper
Abstract
Johnston and Gemmell proposed an authenticated key exchange protocol based on the difficulty of the q-th root problem. They showed that it is provably secure against man-in-the-middle attacks. In this paper we show that the protocol is insecure against an unknown key-share attack and does not achieve forward secrecy. © 2007 The Institute of Electronics, Information and Communication Engineers.
DOI
10.1093/ietfec/e90-a.1.231
Appears in Collections:
자연과학대학
>
수학전공
>
Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML
Show full item record
Find@EWHA
트윗하기
BROWSE
Communities & Collections
By Date
Authors
Titles
Subject