52
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

An authenticated key exchange protocol in elliptic curve cryptography

&
Pages 697-705 | Received 01 Nov 2006, Published online: 03 Jun 2013

References

  • Bellovin , S. M. and Merritt , M. May 1992 . “ Encrypted key exchange: password-based protocols secure against dictionary attacks ” . In Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy May , 72 – 84 . in
  • De win , E. and Preneel , B. 1998 . Elliptic curve public key cryptosystems–an introduction state of the art in applied cryptography , LNCS Vol. 1528 , 131 – 141 . Springer .
  • Diffie , W. and Hellmans , M. November 1976 . “ New directions in cryptography ” . In IEEE Transaction on Information Theory Vol. 22 , November , 644 – 654 . in
  • Johnston , A. M. and Gemmall , P. 2002 . Authenticated key exchange provably secure against the man-in-the-middle attack . Journal of Cryptology , 15 : 139 – 148 . Springer-Verlag
  • Koblitz , N. 1987 . Elliptic curve cryptosystems . Mathematics of Computation , 48 : 203 – 209 .
  • Koyama , K. , Mouser , V. M. , Okamoto , T. and Vanstone , S.A. “ New public-key schemes based on elliptic curves over the ring Zn ” . In CRYPTO’91, LNCS , Vol. 567 , 252 – 266 . Springer-Verlag .
  • http://www.certicom.com/index.php?action=ecc_tutorial,homeOnline elliptic curve cryptography tutorial-certicom
  • Law , L. , Menezes , A. , Qu , M. , Solinas , J. and Vastone , S. March 1998 . “ An efficient protocol for authenticated key agreement ” . In Technical Report CORR 9805 , March , Ontario : Dept. of C&O, University of Waterloo .
  • Miller , V. 1986 . “ Uses of elliptic curves in cryptography ” . In Advances in Cryptology–CRYPTO’85, LNCS , Vol. 278 , 417 – 426 . Springer-Vendor .
  • Stallings , W. 2003 . Cryptography and Network Security , 3rd , Prentice Hall .
  • Al-Sulton , K. and Saeb , M. 2003 . “ M. Elmessiery and U. E’Raouf, A new two-pass key agreement protocol ” . In Proceedings of IEEE Midwest, Symp. Circuits, Systems and Computers in
  • Viega , J. , Messier , M. and Chandra , P. 2002 . Network Security with Open SSL , 1st , O’Reiley .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.