Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/4774
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChatterjee, Sanjit-
dc.contributor.authorMenezes, Alfred-
dc.contributor.authorUstaoğlu, Berkant-
dc.date.accessioned2017-02-01T11:14:44Z-
dc.date.available2017-02-01T11:14:44Z-
dc.date.issued2009-
dc.identifier.citationChatterjee, S., Menezes, A., and Ustaoğlu, B. (2009). Reusing static keys in key agreement protocols. Lecture Notes in Computer Science, 5922 LNCS, 39-56. doi:10.1007/978-3-642-10628-6_3en_US
dc.identifier.isbn9783642106279-
dc.identifier.issn0302-9743-
dc.identifier.issn1611-3349-
dc.identifier.urihttp://doi.org/10.1007/978-3-642-10628-6_3-
dc.identifier.urihttp://hdl.handle.net/11147/4774-
dc.description10th International Conference on Cryptology in India, INDOCRYPT 2009; New Delhi; India; 13 December 2009 through 16 December 2009en_US
dc.description.abstractContrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment protocols described in the standard. In this paper, we give examples of key establishment protocols that are individually secure, but which are insecure when static key pairs are reused in two of the protocols. We also propose an enhancement of the extended Canetti-Krawczyk security model and definition for the situation where static public keys are reused in two or more key agreement protocols. © 2009 Springer-Verlag.en_US
dc.language.isoenen_US
dc.publisherSpringer Verlagen_US
dc.relation.ispartofLecture Notes in Computer Scienceen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectCryptographyen_US
dc.subjectKey agreement protocolsen_US
dc.subjectPublic key cryptographyen_US
dc.subjectSecurity modelen_US
dc.titleReusing static keys in key agreement protocolsen_US
dc.typeConference Objecten_US
dc.authoridTR102756en_US
dc.institutionauthorChatterjee, Sanjit-
dc.institutionauthorMenezes, Alfred-
dc.institutionauthorUstaoğlu, Berkant-
dc.departmentİzmir Institute of Technology. Mathematicsen_US
dc.identifier.volume5922 LNCSen_US
dc.identifier.startpage39en_US
dc.identifier.endpage56en_US
dc.identifier.wosWOS:000278963100003en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1007/978-3-642-10628-6_3-
dc.relation.doi10.1007/978-3-642-10628-6_3en_US
dc.coverage.doi10.1007/978-3-642-10628-6_3en_US
dc.identifier.wosqualityN/A-
dc.identifier.scopusqualityQ3-
item.fulltextWith Fulltext-
item.grantfulltextopen-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeConference Object-
crisitem.author.dept04.02. Department of Mathematics-
Appears in Collections:Mathematics / Matematik
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
4774.pdfConference Paper285.93 kBAdobe PDFThumbnail
View/Open
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

6
checked on Nov 15, 2024

WEB OF SCIENCETM
Citations

4
checked on Nov 9, 2024

Page view(s)

188
checked on Nov 18, 2024

Download(s)

224
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.