Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate
Analysis and improvement of an authenticated multiple key exchange protocol
β Scribed by Qingfeng Cheng; Chuangui Ma
- Publisher
- Elsevier Science
- Year
- 2011
- Tongue
- English
- Weight
- 174 KB
- Volume
- 37
- Category
- Article
- ISSN
- 0045-7906
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
## Abstract ChemInform is a weekly Abstracting Service, delivering concise information at a glance that was extracted from about 100 leading journals. To access a ChemInform Abstract of an article which was published elsewhere, please select a βFull Textβ option. The original article is trackable v
In this paper, which is a continuation of previous work (Part VI), two series of dipepticles, one with leucine and the other with isoleucine as the N-terminal residue, have been examined by both ion-exchange and thin-layer chromatography. The possibility of identifying these compounds in biological