Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
CM-Curves with Good Cryptographic Properties
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Identification Scheme Based on the Elliptic Curve Discrete Logarithm Problem
HPC '00 Proceedings of the The Fourth International Conference on High-Performance Computing in the Asia-Pacific Region-Volume 2 - Volume 2
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Hi-index | 0.00 |
In 2004, Popescu proposed an efficient and secure key agreement protocol based on the Diffie-Hellman key agreement, which works in an elliptic curve group. The protocol, however, is still susceptible to a key-compromise impersonation attack, a reflection attack, and a replay attack. Accordingly, the current paper demonstrates the vulnerability of Popescu's protocol against such attacks and then an improved protocol is presented in order to resolve such problems.