Vulnerability of two multiple-key agreement protocols
From MaRDI portal
Publication:553829
DOI10.1016/J.COMPELECENG.2011.02.007zbMATH Open1220.94049OpenAlexW2066554980MaRDI QIDQ553829FDOQ553829
Authors: Mohammad Sabzinejad Farash, M. Bayat, Mahmoud Ahmadian-Attari
Publication date: 28 July 2011
Published in: Computers and Electrical Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.compeleceng.2011.02.007
Recommendations
- Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
- Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function
- Improved authenticated multiple-key agreement protocol
- An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cited In (7)
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
- Vulnerabilities of one cryptographic protocol
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Two attacks on Neuman-Stubblebine authentication protocols
This page was built for publication: Vulnerability of two multiple-key agreement protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q553829)