Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Yang, CC | en_US |
dc.contributor.author | Chang, TY | en_US |
dc.contributor.author | Hwang, MS | en_US |
dc.date.accessioned | 2014-12-08T15:38:42Z | - |
dc.date.available | 2014-12-08T15:38:42Z | - |
dc.date.issued | 2004-08-01 | en_US |
dc.identifier.issn | 0916-8508 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26486 | - |
dc.description.abstract | In this article, we will present a modification attack and a dictionary attack to subvert the security of the Tseng scheme and the Ku-Wang scheme. As we know, no existing schemes of simple authenticated key agreement protocols can successfully withstand our modification attack. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | cryptography | en_US |
dc.subject | information security | en_US |
dc.subject | key agreement | en_US |
dc.subject | key exchange | en_US |
dc.title | Cryptanalysis of simple authenticated key agreement protocols | en_US |
dc.type | Article | en_US |
dc.identifier.journal | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | en_US |
dc.citation.volume | E87A | en_US |
dc.citation.issue | 8 | en_US |
dc.citation.spage | 2174 | en_US |
dc.citation.epage | 2176 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000223265300045 | - |
dc.citation.woscount | 6 | - |
Appears in Collections: | Articles |