Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Vulnerability of two multiple-key agreement protocols

From MaRDI portal
Publication:553829
Jump to:navigation, search

DOI10.1016/j.compeleceng.2011.02.007zbMath1220.94049OpenAlexW2066554980MaRDI QIDQ553829

Mohammad Sabzinejad Farash, Majid Bayat, Mahmoud Ahmadian-Attari

Publication date: 28 July 2011

Published in: Computers and Electrical Engineering (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.compeleceng.2011.02.007


zbMATH Keywords

cryptographic protocolsforgery attackreflection attackECC-based protocolpairing-based protocol


Mathematics Subject Classification ID

Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)


Related Items (3)

Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps




This page was built for publication: Vulnerability of two multiple-key agreement protocols

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:553829&oldid=12445434"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 30 January 2024, at 07:58.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki