Cargando…
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...
Autores principales: | Yang, Ang, Nam, Junghyun, Kim, Moonseong, Choo, Kim-Kwang Raymond |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658/ https://www.ncbi.nlm.nih.gov/pubmed/25276863 http://dx.doi.org/10.1155/2014/825984 |
Ejemplares similares
-
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
por: Nam, Junghyun, et al.
Publicado: (2014) -
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
por: Nam, Junghyun, et al.
Publicado: (2014) -
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
por: Nam, Junghyun, et al.
Publicado: (2014) -
Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks
por: Nam, Junghyun, et al.
Publicado: (2014) -
Influence of shell structure on neutron and proton exchange in the reactions $^{144}$Sm on $^{144}$Sm and $^{154}$Sm on $^{154}$Sm
por: Wu, E C, et al.
Publicado: (1981)