Abstract — Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas. Recently Chang and Chang proposed a novel three party simple key exchange protocol and claimed the protocol is secure, efficient and practical. Unless their claim, a key recovery attack is proposed on the above protocol by recovering the ephemeral keys. One way of recovering the ephemeral key is to solve the mathematical hard Discrete Logarithm Problem (DLP). The DLP is solved by using a popular Pohlig-Hellman method in the above key recovery attack. In the present study, a new method based on the small subgroup attack to solve the DLP is discussed to recover the ephemeral keys. Computation of DLP is carried ...
Nyberg and Rueppel recently proposed a new ElGamal-type digital signature scheme with message recove...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
[[abstract]]Recently, Tseng and Wu pointed out that the second protocol of Biswas's two-party keys s...
Abstract—The present study investigates the difficulty of solving the mathematical problem, namely t...
. Consider the well-known oracle attack: somehow one gets a certain computation result as a function...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn a...
[[abstract]]Three-party Password-based Authentication Key Exchange (3PAKE) allows a trusted server t...
[[abstract]]In 2004, Chang et al. proposed a new 3PEKE (three-party encrypted key exchange) scheme w...
[[abstract]]In this article, we shall adopt the concepts of elliptic curve cryptosystems and self-ce...
Abstract. We describe new attacks that can be launched on some well known signature schemes. The att...
Cheon first proposed a novel algorithm for solving discrete logarithm problem with auxiliary inputs....
[[abstract]]Public key cryptosystems are proposed to protect users'security of communications over t...
In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with constant roun...
Nyberg and Rueppel recently proposed a new ElGamal-type digital signature scheme with message recove...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
[[abstract]]Recently, Tseng and Wu pointed out that the second protocol of Biswas's two-party keys s...
Abstract—The present study investigates the difficulty of solving the mathematical problem, namely t...
. Consider the well-known oracle attack: somehow one gets a certain computation result as a function...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
Key exchange protocols allow two or more parties communicating over a public network to establish a ...
In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn a...
[[abstract]]Three-party Password-based Authentication Key Exchange (3PAKE) allows a trusted server t...
[[abstract]]In 2004, Chang et al. proposed a new 3PEKE (three-party encrypted key exchange) scheme w...
[[abstract]]In this article, we shall adopt the concepts of elliptic curve cryptosystems and self-ce...
Abstract. We describe new attacks that can be launched on some well known signature schemes. The att...
Cheon first proposed a novel algorithm for solving discrete logarithm problem with auxiliary inputs....
[[abstract]]Public key cryptosystems are proposed to protect users'security of communications over t...
In PKC 2006, Abdalla et al. proposed a password-based group key exchange protocol with constant roun...
Nyberg and Rueppel recently proposed a new ElGamal-type digital signature scheme with message recove...
Exchanging cryptographic keys has been a problem with respect to security. Whitfield Diffie and Mart...
[[abstract]]Recently, Tseng and Wu pointed out that the second protocol of Biswas's two-party keys s...