{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:45:59Z","timestamp":1725489959418},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401612"},{"type":"electronic","value":"9783540448433"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44843-8_21","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T03:42:01Z","timestamp":1187149321000},"page":"191-200","source":"Crossref","is-referenced-by-count":4,"title":["Security Analysis and Applications of Standard Key Agreement Protocols"],"prefix":"10.1007","author":[{"given":"Soohyun","family":"Oh","sequence":"first","affiliation":[]},{"given":"Jin","family":"Kwak","sequence":"additional","affiliation":[]},{"given":"Seungwoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"21_CR1","unstructured":"ANSI X9.42, \u201cAgreement of symmetric Key on Using Diffie-Hellman Cryptography,\u201d (2001)"},{"key":"21_CR2","unstructured":"ANSI X9.63, \u201cPublic Key Cryptography for the financial services industry: key agreement and key transport using elliptic curve cryptography,\u201d (2001)"},{"key":"21_CR3","series-title":"Lect Notes Comput Sci","first-page":"30","volume-title":"Cryptography and Coding","author":"B.-W. S","year":"1997","unstructured":"S. Blake-Wilson, D. Johnson, A. Menezes, \u201cKey agreement protocols and their security analysis,\u201d Cryptography and Coding, Lecture Notes in Computer Science 1355, pp. 30\u201345, (1997)"},{"issue":"6","key":"21_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie, M.E. Hellman, \u201cNew directions in cryptography,\u201d IEEE Transaction of Information Theory, IT-22, 6, pp. 644\u2013654, (1976)","journal-title":"IEEE Transaction of Information Theory"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"W. Diffie, P.C. Oorschot, M.J. Wiener, \u201cAuthentication and Authenticated Key Exchange,\u201d Designs, Codes and Cryptography, pp. 107\u2013125, (1992)","DOI":"10.1007\/BF00124891"},{"key":"21_CR6","unstructured":"IEEE P1363, \u201cStandard for Public-Key Cryptography,\u201d Working draft D13, (1999)"},{"key":"21_CR7","unstructured":"D. Johnson, \u201cDiffie-Hellman Key Agreement Small Subgroup Attack,\u201d a Contribution to X9F1 by Certicom, July, (1996)"},{"key":"21_CR8","unstructured":"S.J. Kim, M. Mambo et al, \u201cOn the security of the Okamoto-Tanaka ID-Based Key Exchange scheme against Active attacks,\u201d IEICE Trans, pp. 231\u2013238, Jan. (2001)"},{"issue":"1","key":"21_CR9","first-page":"77","volume":"E82-A","author":"M. Mambo","year":"1999","unstructured":"M. Mambo and H. Shizuya, \u201cA note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme,\u201d IEICE Trans. Fundamentals, vol. E82-A, no.1, pp. 77\u201380, Jan, (1999)","journal-title":"IEICE Trans. Fundamentals"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"R.A. Rueppel, P.C. van Oorschot, \u201cModern Key Agreement Techniques,\u201d Computer Communications, pp. 458\u2013465, (1994)","DOI":"10.1016\/0140-3664(94)90100-7"},{"key":"21_CR11","unstructured":"RSA Laboratories Technical Note v1.4, \u201cPKCS #3: Diffie-Hellman Key Agreement Standard,\u201d (1993)"},{"issue":"7","key":"21_CR12","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/0140-3664(94)90100-7","volume":"17","author":"R.A. Rueppel","year":"1994","unstructured":"R.A Rueppel and P.C van Oorschot, \u201cModern Key Agreement Techniques,\u201d Computer communications volume 17 number 7, pp. 458\u2013465, (1994)","journal-title":"Computer communications"},{"key":"21_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-49264-X_28","volume-title":"Proc. Eurocrypto\u2019 95","author":"K. Sakurai","year":"1995","unstructured":"K. Sakurai and H. Shizuya, \u201cRelationships among the computational powers of breaking discrete log cryptosystems,\u201d Proc. Eurocrypto\u2019 95 LNCS 921, pp. 341\u2013355, Springer-Verlag, (1995)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2014 ICCSA 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44843-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T16:20:03Z","timestamp":1550766003000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44843-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401612","9783540448433"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-44843-8_21","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}