Remarks on unknown key-share attack on authenticated multiple-key agreement protocol

Key-agreement protocol Shim (computing)
DOI: 10.1049/el:20030804 Publication Date: 2003-08-27T15:45:29Z
ABSTRACT
Recently Shim gave an attack on Harn's modified authenticated multiple-key agreement protocol. The authors point out Shim's is not workable. However, protocol still insecure and the give another it. Finally, propose efficient that can prevent this attack.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (6)
CITATIONS (10)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....