咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Authenticated Key Agreement Pr... 收藏

Authenticated Key Agreement Protocols: A Comparative Study

Authenticated Key Agreement Protocols: A Comparative Study

作     者:Areej Omar Baalghusun Olfa Fahad Abusalem Zahra Abbas Al Abbas Jayaprakash Kar 

作者机构:Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah KSA Department of Information Systems Information Security Research Group Faculty of Computing and Information Technology King Abdulaziz University Jeddah KSA 

出 版 物:《Journal of Information Security》 (信息安全(英文))

年 卷 期:2015年第6卷第1期

页      面:51-58页

学科分类:0810[工学-信息与通信工程] 08[工学] 081001[工学-通信与信息系统] 

主  题:Impersonation Resilience Prime Factorization ECDLP Trapdoor Function 

摘      要:One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分