Back to Results
First PageMeta Content
Cryptographic protocols / Cryptography / Public-key cryptography / Password authentication protocol


Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2
Add to Reading List

Document Date: 2003-12-19 03:05:28


Open Document

File Size: 89,33 KB

Share Result on Facebook

City

Taejon / /

Company

G2 / Authenticated Two Round MultiParty Key Agreement / G1 / D. H. Lee / Ge / Bilinear / /

Country

Australia / KOREA / /

/

Event

Business Partnership / /

Facility

Communications University / Computer Science University of Wollongong / /

IndustryTerm

cyclic multiplicative / cyclic additive / authenticated group key agreement protocol / collaborative and distributed applications / agreement protocol / basic tool / /

Organization

Information and Communications University / University of Wollongong / School of Information Technology / Key Generation Center / /

/

PublishedMedium

Cryptology ePrint Archive / /

Technology

cryptography / public key / Information Technology / key agreement protocol / private key / former protocol / /

SocialTag