Vulnerability of two multiple-key agreement protocols
From MaRDI portal
Publication:553829
DOI10.1016/j.compeleceng.2011.02.007zbMath1220.94049OpenAlexW2066554980MaRDI QIDQ553829
Mohammad Sabzinejad Farash, Majid Bayat, Mahmoud Ahmadian-Attari
Publication date: 28 July 2011
Published in: Computers and Electrical Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.compeleceng.2011.02.007
Cryptography (94A60) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
This page was built for publication: Vulnerability of two multiple-key agreement protocols