A Note on Leakage-Resilient Authenticated Key Exchange
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chun, Ji Young | - |
dc.contributor.author | Hwang, Jung Yeon | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-08T17:28:44Z | - |
dc.date.available | 2021-09-08T17:28:44Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2009-05 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/120100 | - |
dc.description.abstract | Fathi et al. recently proposed a leakage-resilient authenticated key exchange protocol for a server-client model in mobility environment over wireless links. In the paper, we address flaws in a hash function used in the protocol. The direct use of the hash function cannot guarantee the security of the protocol. We also point out that a combination of the hash function and the RSA cryptosystem in the protocol may not work securely. To remedy these problems, we improve upon the protocol by modifying the hash function correctly. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | RSA | - |
dc.subject | EFFICIENT | - |
dc.subject | NETWORKS | - |
dc.title | A Note on Leakage-Resilient Authenticated Key Exchange | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Chun, Ji Young | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1109/TWC.2009.080693 | - |
dc.identifier.scopusid | 2-s2.0-77955719586 | - |
dc.identifier.wosid | 000265984400019 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, v.8, no.5, pp.2274 - 2279 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.title | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | - |
dc.citation.volume | 8 | - |
dc.citation.number | 5 | - |
dc.citation.startPage | 2274 | - |
dc.citation.endPage | 2279 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | RSA | - |
dc.subject.keywordPlus | EFFICIENT | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordAuthor | Password | - |
dc.subject.keywordAuthor | authentication | - |
dc.subject.keywordAuthor | key exchange | - |
dc.subject.keywordAuthor | leakage-resilience | - |
dc.subject.keywordAuthor | e-residue attack | - |
dc.subject.keywordAuthor | off-line dictionary attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.