Remarks on unknown key-share attack on authenticated multiple-key agreement protocol
Key-agreement protocol
Shim (computing)
DOI:
10.1049/el:20030804
Publication Date:
2003-08-27T15:45:29Z
AUTHORS (3)
ABSTRACT
Recently Shim gave an attack on Harn's modified authenticated multiple-key agreement protocol. The authors point out Shim's is not workable. However, protocol still insecure and the give another it. Finally, propose efficient that can prevent this attack.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (6)
CITATIONS (10)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....