{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:48:49Z","timestamp":1742384929601},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540354376"},{"type":"electronic","value":"9783540354383"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11767480_15","type":"book-chapter","created":{"date-parts":[[2006,7,4]],"date-time":"2006-07-04T01:21:27Z","timestamp":1151976087000},"page":"226-238","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords"],"prefix":"10.1007","author":[{"given":"Raphael C. -W.","family":"Phan","sequence":"first","affiliation":[]},{"given":"Bok-Min","family":"Goi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-30580-4_6","volume-title":"Public Key Cryptography - PKC 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-Based Authenticated Key Exchange in the Three-Party Setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 65\u201384. Springer, Heidelberg (2005)"},{"issue":"12","key":"15_CR2","first-page":"2766","volume":"E83-A","author":"J. Baek","year":"2000","unstructured":"Baek, J., Kim, K.: Remarks on the Unknown Key-share Attacks. IEICE Transactions on Fundamentals\u00a0E83-A(12), 2766\u20132769 (2000)","journal-title":"IEICE Transactions on Fundamentals"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably Secure Key Distribution - the Three Party Case. In: Proc. ACM-SToC 1996, pp. 72\u201384 (1996)","DOI":"10.1145\/225058.225084"},{"key":"15_CR5","first-page":"72","volume-title":"Proc. IEEE S&P 1992","author":"S.M. Bellovin","year":"1992","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In: Proc. IEEE S&P 1992, pp. 72\u201384. IEEE Press, Los Alamitos (1992)"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/3-540-36178-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"E. Bresson","year":"2002","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 497\u2013514. Springer, Heidelberg (2002)"},{"key":"15_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11496137_6","volume-title":"Applied Cryptography and Network Security","author":"J.W. Byun","year":"2005","unstructured":"Byun, J.W., Lee, D.-H.: N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 75\u201390. Springer, Heidelberg (2005)"},{"key":"15_CR8","unstructured":"Byun, J.W., Lee, D.H.: Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR ePrint Archive, 2005\/209 (2005)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-540-45203-4_21","volume-title":"Applied Cryptography and Network Security","author":"J.-G. Choi","year":"2003","unstructured":"Choi, J.-G., Sakurai, K., Park, J.-H.: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol.\u00a02846, pp. 265\u2013279. Springer, Heidelberg (2003)"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P., Wiener, M.: Authentication and Authenticated Key Exchanges. Design, Codes and Cryptography\u00a02(2), 107\u2013125 (1992)","journal-title":"Design, Codes and Cryptography"},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y. Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review\u00a029(4), 77\u201386 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Franklin, M.K., Reiter, M.K.: Fair Exchange with a Semi-trusted Third Party (Extended Abstract). In: Proc. ACM-CCS 1997, pp. 1\u20135 (1997)","DOI":"10.1145\/266420.266424"},{"issue":"5","key":"15_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"20","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong Password-only Authenticated Key Exchange. ACM Computer Communications Review\u00a020(5), 5\u201326 (1996)","journal-title":"ACM Computer Communications Review"},{"issue":"3","key":"15_CR14","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1145\/501978.501981","volume":"4","author":"B.S. Kaliski Jr.","year":"2001","unstructured":"Kaliski Jr., B.S.: An Unknown Key-share Attack on the MQV Key Agreement Protocol. ACM Transactions on Information and System Security\u00a04(3), 275\u2013288 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. In: Proc. ACM-CCS 2005, pp. 180\u2013189 (2005)","DOI":"10.1145\/1102120.1102146"},{"issue":"4","key":"15_CR16","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"C.-L. Lin","year":"2000","unstructured":"Lin, C.-L., Sun, H.-M., Hwang, T.: Three-Party Encrypted Key Exchange: Attacks and a Solution. ACM Operating Systems Review\u00a034(4), 12\u201320 (2000)","journal-title":"ACM Operating Systems Review"},{"issue":"12","key":"15_CR17","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"C.-L. Lin","year":"2001","unstructured":"Lin, C.-L., Sun, H.-M., Steiner, M., Hwang, T.: Three-Party Encrypted Key Exchange Without Server Public-Keys. IEEE Communication Letters\u00a05(12), 497\u2013499 (2001)","journal-title":"IEEE Communication Letters"},{"key":"15_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/BFb0053744","volume-title":"Information Security and Privacy","author":"S. Saeednia","year":"1998","unstructured":"Saeednia, S., Safavi-Naini, R.: Efficient Identity-Based Conference Key Distribution Protocols. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol.\u00a01438, pp. 320\u2013331. Springer, Heidelberg (1998)"},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/S0304-3975(01)00141-4","volume":"283","author":"V. Shmatikov","year":"2002","unstructured":"Shmatikov, V., Mitchell, J.C.: Finite-state Analysis of Two Contract Signing Protocols. Theoretical Computer Science\u00a0283(2), 419\u2013450 (2002)","journal-title":"Theoretical Computer Science"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waider, M.: Refinement and Extension of Encrypted Key Exchange. ACM Operating Systems Review\u00a029(3), 22\u201330 (1995)","journal-title":"ACM Operating Systems Review"},{"key":"15_CR21","unstructured":"Tang, Q., Chen, L.: Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR ePrint Archive, 2005\/197 (2005)"},{"key":"15_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/10958513_8","volume-title":"Information Security","author":"J. Zhou","year":"2003","unstructured":"Zhou, J., Bao, F., Deng, R.: Validating Digital Signatures without TTP\u2019s Time-Stamping and Certificate Revocation. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 96\u2013110. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","RoboCup 2005: Robot Soccer World Cup IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11767480_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T15:35:41Z","timestamp":1555688141000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11767480_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540354376","9783540354383"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11767480_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}