{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:38Z","timestamp":1772283638211,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540429876","type":"print"},{"value":"9783540456827","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45682-1_17","type":"book-chapter","created":{"date-parts":[[2007,5,26]],"date-time":"2007-05-26T02:31:48Z","timestamp":1180146708000},"page":"272-289","source":"Crossref","is-referenced-by-count":28,"title":["Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices"],"prefix":"10.1007","author":[{"given":"Duncan S.","family":"Wong","sequence":"first","affiliation":[]},{"given":"Agnes H.","family":"Chan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,11,20]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ashar Aziz and Whitfield Diffie. A secure communcations protocol to prevent unauthorized access \u2014 privacy and authentication for wireless local area networks. IEEE Personal Communications, First Quarter 1994.","DOI":"10.1109\/98.295357"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In First ACM Conference on Computer and Communications Security, pages 62\u201373, Fairfax, 1993. ACM.","DOI":"10.1145\/168588.168596"},{"key":"17_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Proc. CRYPTO 93","author":"M. Bellare","year":"1994","unstructured":"Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Douglas R. Stinson, editor, Proc. CRYPTO 93, pages 232\u2013249. Springer, 1994. Lecture Notes in Computer Science No. 773."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Provably secure session key distribution-the three party case. In Proc. 27th ACM Symp. on Theory of Computing, pages 57\u201366, Las Vegas, 1995. ACM.","DOI":"10.1145\/225058.225084"},{"key":"17_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-46766-1_3","volume-title":"Proc. CRYPTO 91","author":"R. Bird","year":"1992","unstructured":"R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 44\u201361. Springer, 1992. Lecture Notes in Computer Science No. 576."},{"key":"17_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1007\/BFb0024447","volume-title":"Key agreement protocols and their security analysis","author":"S. Blake-Wilson","year":"1997","unstructured":"Simon Blake-Wilson, Don Johnson, and Alfred Menezes. Key agreement protocols and their security analysis. In Sixth IMA International Conference on Cryptography and Coding, pages 30\u201345, 1997. Lecture Notes in Computer Science No. 1355."},{"key":"17_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/3-540-48892-8_26","volume-title":"Authenticated Diffie-Hellman key agreement protocols","author":"S. Blake-Wilson","year":"1999","unstructured":"Simon Blake-Wilson and Alfred Menezes. Authenticated Diffie-Hellman key agreement protocols. In 5th annual international workshop, SAC\u201998, pages 339\u2013361. Springer-Verlag, 1998. Lecture Notes in Computer Science No. 1556."},{"key":"17_CR8","unstructured":"J. Daemen and V. Rijmen. AES Proposal: Rijndael. AES Algorithm Submission, Sep 1999. http:\/\/www.nist.gov\/aes ."},{"key":"17_CR9","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644\u2013654, November 1976.","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"17_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Whitfield Diffie, Paul C. Van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2(2):107\u2013125, June 1992.","journal-title":"Designs, Codes, and Cryptography"},{"key":"17_CR11","unstructured":"Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL Protocol Version 3.0. INTERNET-DRAFT, Nov 1996. www.netscape.com\/eng\/ssl3\/draft302.txt ."},{"issue":"2","key":"17_CR12","first-page":"270","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"S. Goldwasser and S. Micali. Probabilistic encryption. JCSS, 28(2):270\u2013299, April 1984.","journal-title":"JCSS"},{"key":"17_CR13","unstructured":"Shafi Goldwasser and Mihir Bellare. Lecture Notes on Cryptography. http:\/\/wwwcse.ucsd.edu\/users\/mihir\/papers\/gb.html , 1996."},{"key":"17_CR14","unstructured":"IEEE. P1363: Standard Specifications For Public Key Cryptography, Nov 1999. Draft P1363 \/ D13."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Markus Jakobsson and David Pointcheval. Mutual authentication for low-power mobile devices. In P. Syverson, editor, Proceedings of Financial Cryptography 2001. Springer-Verlag, February 2001.","DOI":"10.1007\/3-540-46088-8_17"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"J. Kohl and C. Neuman. The Kerberos Network Authentication Service (V5). IETF RFC1510, Sep 1993.","DOI":"10.17487\/rfc1510"},{"key":"17_CR17","unstructured":"Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, and Scott Vanstone. An efficient protocol for authenticated key agreement. Technical Report CORR 98-05, University of Waterloo, 1998."},{"key":"17_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"A key recovery attack on discrete log-based schemes using a prime order subgroup","author":"C. Lim","year":"1997","unstructured":"C. Lim and P. Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In Proc. CRYPTO 97, pages 249\u2013263. Springer, 1997. Lecture Notes in Computer Science No. 1294."},{"key":"17_CR19","unstructured":"Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press LLC, 1997."},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"C. Mitchell. Limitations of challenge-response entity authentication. Electronics Letters, 25(17), Aug 1989.","DOI":"10.1049\/el:19890801"},{"issue":"12","key":"17_CR21","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993\u2013999, December 1978.","journal-title":"Communications of the ACM"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Dave Otway and Owen Rees. Efficient and timely mutual authentication. Operating Systems Review, 21, Jan 1987.","DOI":"10.1145\/24592.24594"},{"key":"17_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Proc. CRYPTO 89","author":"C. P. Schnorr","year":"1990","unstructured":"C. P. Schnorr. Efficient identification and signatures for smart cards. In G. Brassard, editor, Proc. CRYPTO 89, pages 239\u2013252. Springer, 1990. Lecture Notes in Computer Science No. 435."},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"C. P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4(3), 1991.","DOI":"10.1007\/BF00196725"},{"key":"17_CR25","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1007\/3-540-69053-0_18","volume-title":"Proc. EUROCRYPT 97","author":"V. Shoup","year":"1997","unstructured":"Victor Shoup. Lower bounds for discrete logarithms and related problems. In Walter Fumy, editor, Proc. EUROCRYPT 97, pages 256\u2013266. Springer, 1997. Lecture Notes in Computer Science No. 1233."},{"key":"17_CR26","unstructured":"Duncan S. Wong and Agnes H. Chan. Mutual authentication and key exchange for low power wireless communications. to appear in IEEE MILCOM 2001 Conference Proceedings, Oct 2001."},{"key":"17_CR27","unstructured":"Duncan S. Wong, Hector Ho Fuentes, and Agnes H. Chan. The performance measurement of cryptographic primitives on palm devices. to appear in the Proceedings of the 17th Annual Computer Security Applications Conference, Dec 2001."},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Muxiang Zhang, Christopher Carroll, and Agnes H. Chan. The software-oriented stream cipher SSC2. Fast Software Encryption Workshop 2000, 2000.","DOI":"10.1007\/3-540-44706-7_3"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 ASIACRYPT 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45682-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T06:48:02Z","timestamp":1556434082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45682-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540429876","9783540456827"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-45682-1_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}