Attacks on improved key distribution protocols with perfect reparability
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply t...
Saved in:
Main Authors: | Raphael C.-W. Phan, Bok-Min Goi |
---|---|
Format: | Default Conference proceeding |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/5694 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
(In)security of efficient tree-based group key agreement using bilinear map
by: Raphael C.-W. Phan, et al.
Published: (2008) -
Analysis of two pairing-based three-party password authenticated key exchange protocols
by: Raphael C.-W. Phan, et al.
Published: (2009) -
Security of group key exchange protocols with different passwords
by: Raphael C.-W. Phan
Published: (2009) -
Security of two recent constant-round password authenticated group key exchange schemes
by: Raphael C.-W. Phan
Published: (2009) -
Traceable privacy of recent provably-secure RFID protocols
by: Khaled Ouafi, et al.
Published: (2008)