Z Mohammad - ICIC Express Letters, 2019 - icicel.org
In NRSC28, Elkamchouchi and Abu Elkair proposed an efficient protocol for authenticated key agreement, and the authors claimed that the proposed protocol is secure against known …
Recently, Shim proposed a tripartite authenticated key agreement protocol from Weil pairing to overcome the security flaw in Joux's protocol. Later, Shim also proposed an ID-based …
Z Mohammad, CL Hsu, YC Chen, CC Lo - 網際網路技術學刊, 2013 - airitilibrary.com
Key agreement protocols are a foundation for distributing a common secret key over an insecure network. Lim et al. proposed a secure and efficient three-pass authenticated key …
CC Yang, TY Chang, MS Hwang - IEICE transactions on …, 2004 - search.ieice.org
In this article, we will present a modification attack and a dictionary attack to subvert the security of the Tseng scheme and the Ku-Wang scheme. As we know, no existing schemes …
P Nose - Information Processing Letters, 2011 - Elsevier
In this paper, we analyze the protocols of Tan, Lim et al., Chen et al. and five protocols of Hölbl et al. After the analysis, we found that Tan et al. ʼs, Lim et al. ʼs and two protocols of …
Q Cheng, C Ma - Cryptology ePrint Archive, 2009 - eprint.iacr.org
Abstract Recently, Dario Fiore and Rosario Gennaro proposed the IB-KA protocol, which was inspired by MQV protocol. They provide a full proof of security of IB-KA protocol using …
nowadays, the success of many online applications relays on keeping the data sent through the global network secure and far away from hackers. To carry out this task, the two …
R Lu, Z Cao, R Su, J Shao - Cryptology ePrint Archive, 2005 - eprint.iacr.org
To achieve secure data communications, two parties should be authenticated by each other and agree on a secret session key by exchanging messages over an insecure channel. In …
Z Mohammad, YC Chen, CL Hsu, CC Lo - IETE Technical Review, 2010 - Taylor & Francis
In NRSC24, Elkamchouchi et al. proposed a new approach for key controlled agreement to provide key control in the Pour public key distribution system. In NRSC25, they further …