{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T13:26:25Z","timestamp":1773321985467,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540280613","type":"print"},{"value":"9783540318064","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11533719_95","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T09:34:13Z","timestamp":1127813653000},"page":"945-954","source":"Crossref","is-referenced-by-count":6,"title":["New Efficient Simple Authenticated Key Agreement Protocol"],"prefix":"10.1007","author":[{"given":"Eun-Jun","family":"Yoon","sequence":"first","affiliation":[]},{"given":"Kee-Young","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"95_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transaction on Information Theory\u00a0IT-22(6), 644\u2013654 (1976)","journal-title":"IEEE Transaction on Information Theory"},{"key":"95_CR2","volume-title":"Applied Cryptography-Protocols. Algorithms and Source Code in C","author":"B. Schneier","year":"1995","unstructured":"Schneier, B.: Applied Cryptography-Protocols. Algorithms and Source Code in C, 2nd edn. John Wiley & Sons, Inc., Chichester (1995)","edition":"2"},{"key":"95_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., Van Oorschot, P.C., Wiener, M.J.: Authentication and Authenticated Key Exchanges. Design, Codes and Cryptography\u00a02, 107\u2013125 (1992)","journal-title":"Design, Codes and Cryptography"},{"key":"95_CR4","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. In: Proc. of IEEE Conf. on Research in Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"issue":"13","key":"95_CR5","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1049\/el:19990724","volume":"35","author":"D.H. Seo","year":"1999","unstructured":"Seo, D.H., Sweeney, P.: Simple Authenticated Key Agreement Algorithm. Electronics Letters\u00a035(13), 1073\u20131074 (1999)","journal-title":"Electronics Letters"},{"issue":"1","key":"95_CR6","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1049\/el:20000112","volume":"36","author":"Y.M. Tseng","year":"2000","unstructured":"Tseng, Y.M.: Weakness in Simple Authenticated Key Agreement Protocol. Electronics Letters\u00a036(1), 48\u201349 (2000)","journal-title":"Electronics Letters"},{"key":"95_CR7","unstructured":"Lin, I.C., Chang, C.C., Hwang, M.S.: Security Enhancement for the Simple Authentication Key Agreement Algorithm. In: Proceedings of the 24th Annual International Computer Software and Application Conference, pp. 113\u2013115 (2000)"},{"issue":"21","key":"95_CR8","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1049\/el:20001269","volume":"36","author":"W.C. Ku","year":"2000","unstructured":"Ku, W.C., Wang, S.D.: Cryptanalysis of Modified Authenticated Key Agreement Protocol. Electronics Letters\u00a036(21), 1770\u20131771 (2000)","journal-title":"Electronics Letters"},{"issue":"2-3","key":"95_CR9","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/S0096-3003(02)00304-1","volume":"142","author":"C.L. Hsu","year":"2003","unstructured":"Hsu, C.L., Wu, T.S., Wu, T.C., Mitchell, C.: Improvement of Modified Authenticated Key Agreement Protocol. Applied Mathematics and Computation\u00a0142(2-3), 305\u2013308 (2003)","journal-title":"Applied Mathematics and Computation"},{"issue":"3","key":"95_CR10","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/j.amc.2003.08.057","volume":"157","author":"N.Y. Lee","year":"2004","unstructured":"Lee, N.Y., Lee, M.F.: Further Improvement on the Modified Authenticated Key Agreement Scheme. Applied Mathematics and Computation\u00a0157(3), 729\u2013733 (2004)","journal-title":"Applied Mathematics and Computation"},{"key":"95_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/978-3-540-24587-2_67","volume-title":"Algorithms and Computation","author":"E.K. Ryu","year":"2003","unstructured":"Ryu, E.K., Kim, K.W., Yoo, K.Y.: A Promising Key Agreement Protocol. In: Ibaraki, T., Katoh, N., Ono, H. (eds.) ISAAC 2003. LNCS, vol.\u00a02906, pp. 655\u2013662. Springer, Heidelberg (2003)"},{"issue":"3","key":"95_CR12","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1016\/j.amc.2004.01.011","volume":"162","author":"S.W. Lee","year":"2005","unstructured":"Lee, S.W., Kim, H.S., Yoo, K.Y.: Improvement of Lee and Lee\u2019s Authenticated Key Agreement Scheme. Applied Mathematics and Computation\u00a0162(3), 1049\u20131053 (2005)","journal-title":"Applied Mathematics and Computation"},{"issue":"3","key":"95_CR13","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1016\/j.amc.2004.03.010","volume":"162","author":"S.W. Lee","year":"2005","unstructured":"Lee, S.W., Kim, H.S., Yoo, K.Y.: Improvement of HWWM-Authenticated Key Agreement Protocol. Applied Mathematics and Computation\u00a0162(3), 1315\u20131320 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"95_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1007\/978-3-540-24707-4_87","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2004","author":"Y.S. Kim","year":"2004","unstructured":"Kim, Y.S., Huh, E.N., Hwang, J.H., Lee, B.W.: An Efficient Key Agreement Protocol for Secure Authentication. In: Lagan\u00e1, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol.\u00a03043, pp. 746\u2013754. Springer, Heidelberg (2004)"},{"key":"95_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/3-540-45067-X_39","volume-title":"Information Security and Privacy","author":"Y.H. Hwang","year":"2003","unstructured":"Hwang, Y.H., Yum, D.H., Lee, P.J.: EPA: An Efiicient Password-Based Protocol for Authenticated Key Exchange. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 452\u2013463. Springer, Heidelberg (2003)"},{"key":"95_CR16","unstructured":"The latest draft of IEEE P1363.2.: Standard Specifications for Password- Based Public Key Cryptography Techniques. Draft D19. December 17 (2004), \n                    \n                      http:\/\/grouper.ieee.org\/groups\/1363\/"}],"container-title":["Lecture Notes in Computer Science","Computing and Combinatorics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11533719_95","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T04:02:02Z","timestamp":1553140922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11533719_95"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280613","9783540318064"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11533719_95","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}