𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Modern key agreement techniques

✍ Scribed by Rainer A Rueppel; Paul C van Oorschot


Publisher
Elsevier Science
Year
1994
Tongue
English
Weight
808 KB
Volume
17
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Non-abelian key agreement protocols
✍ Iris Anshel; Michael Anshel; Dorian Goldfeld πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 115 KB

A key-agreement protocol (KAP) is a multi-party algorithm deΓΏned by a sequence of steps specifying the actions required for two or more individuals to each obtain a shared secret. A brief introduction to an axiomatic basis for non-abelian KAPs is presented. The security of these protocols is related

Cryptographic Key Agreement for Mobile R
✍ Amer A. Hassan; Wayne E. Stark; John E. Hershey; Sandeep Chennakeshu πŸ“‚ Article πŸ“… 1996 πŸ› Elsevier Science 🌐 English βš– 142 KB

The problem of establishing a mutually held secret cryptographic key using a radio channel is addressed. The performance of a particular key distribution system is evaluated for a practical mobile radio communications system. The performance measure taken is probabilistic, and different from the Sha

Key agreement in ad hoc networks
✍ N Asokan; P Ginzboorg πŸ“‚ Article πŸ“… 2000 πŸ› Elsevier Science 🌐 English βš– 284 KB

We encounter new types of security problems in ad hoc networks because such networks have little or no support infrastructure. In this paper we consider one such problem: a group of people in a meeting room do not have access to public key infrastructure or third party key management service, and th

Vulnerability of two multiple-key agreem
✍ Mohammad Sabzinejad Farash; Majid Bayat; Mahmoud Ahmadian Attari πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 195 KB

In 2008, Lee et al. proposed two multiple-key agreement protocols, first one based on elliptic curve cryptography (ECC) and the other one, based on bilinear pairings. Shortly after publication, Vo et al. showed that the Lee-Wu-Wang's pairing-based protocol is vulnerable to impersonation attack then