Keyword List
Japanese Page
SITE TOP
Login
To browse Full-Text PDF.
>
Forgotten your password?
Menu
Search
Full-Text Search
Search(JPN)
Latest Issue
A Fundamentals
Trans.Fundamentals.
JPN Edition(in Japanese)
B Communications
Trans.Commun.
JPN Edition(in Japanese)
C Electronics
Trans.Electron.
JPN Edition(in Japanese)
D Information & Systems
Trans.Inf.&Syst.
JPN Edition(in Japanese)
Abstracts of JPN Edition
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
-
Archive
Volume List
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Transactions (1976-1990)
Volume List [JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
-
Editorial Board
Editorial Board
Trans.Fundamentals.
Trans.Commun.
Trans.Electron.
Trans.Inf.&Syst.
Archive
Editorial Board[JPN Edition]
A JPN Edition(in Japanese)
B JPN Edition(in Japanese)
C JPN Edition(in Japanese)
D JPN Edition(in Japanese)
Archive
-
Open Access Papers
Trans. Commun. (Free)
Trans. Commun.
Trans. Commun.(JPN Edition)
Trans. Electron. (Free)
Trans. Electron.
Trans. Electron.(JPN Edition)
Trans. Inf.&Syst. (Free)
Trans. Inf.&Syst.
Trans. Inf.&Syst.(JPN Edition)
-
Link
Subscription
For Authors
Statistics:
Accepting ratio,review period etc.
IEICE Home Page
-
Others
Citation Index
Privacy Policy
Copyright & Permissions
Copyright (c) by IEICE
Keyword : key agreement protocol
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment
JoongHyo OH
SangJae MOON
Jianfeng MA
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2006/03/01
Vol.
E89-A
No.
3
;
pp.
826-829
Type of Manuscript:
LETTER
Category:
Information Security
Keyword:
identity-based cryptosystem
,
key agreement protocol
,
bilinear map
,
multiple PKG
,
implicit key authentication
,
Summary
|
Full Text:PDF
(70.3KB)
Braid Groups in Cryptology
Eonkyung LEE
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2004/05/01
Vol.
E87-A
No.
5
;
pp.
986-992
Type of Manuscript:
INVITED PAPER (Special Section on Discrete Mathematics and Its Applications)
Category:
Keyword:
braid group
,
conjugacy search problem
,
key agreement protocol
,
pseudorandom number generator
,
bit security
,
Summary
|
Full Text:PDF
(194.3KB)
Key Agreement Protocols Resistant to a Denial-of-Service Attack
Shouichi HIROSE
Kanta MATSUURA
Publication:
IEICE TRANSACTIONS on Information and Systems
Publication Date:
2001/04/01
Vol.
E84-D
No.
4
;
pp.
477-484
Type of Manuscript:
PAPER
Category:
Applications of Information Security Techniques
Keyword:
key agreement protocol
,
denial-of-service (DoS) attack
,
resource-exhaustion attack
,
Diffie-Hellman key agreement protocol
,
Summary
|
Full Text:PDF
(323KB)
Remarks on the Unknown Key Share Attacks
Joonsang BAEK
Kwangjo KIM
Publication:
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date:
2000/12/25
Vol.
E83-A
No.
12
;
pp.
2766-2769
Type of Manuscript:
LETTER
Category:
Information Security
Keyword:
unknown key-share attack
,
duplicate-signature key selection
,
public key substitution
,
key agreement protocol
,
Summary
|
Full Text:PDF
(162KB)