A course in computational algebraic number theory
A course in computational algebraic number theory
Analysis and improvement of an authenticated multiple key exchange protocol
Computers and Electrical Engineering
Hi-index | 0.00 |
Recently, an improved protocol for authenticated multiple-key agreement was proposed. In this article, an attack on that protocol is shown in which, with half probability, an adversary can impersonate any participant of the protocol to generate "shared" keys with others.