{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:21:49Z","timestamp":1740172909219,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T00:00:00Z","timestamp":1678406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00471-4","type":"journal-article","created":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T17:02:51Z","timestamp":1678467771000},"page":"225-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The threat of forcing the identical roles for authenticated key establishment protocols"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1279-0359","authenticated-orcid":false,"given":"Evgeny","family":"Alekseev","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Kyazhin","sequence":"additional","affiliation":[]},{"given":"Stanislav","family":"Smyshlyaev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,10]]},"reference":[{"key":"471_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology\u2014CRYPTO\u2019 93","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) Advances in Cryptology\u2014CRYPTO\u2019 93. Lecture Notes in Computer Science, vol. 773, pp. 232\u2013249. Springer, Berlin, Heidelberg (1994)"},{"key":"471_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2000","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2000. Lecture Notes in Computer Science, vol. 1807, pp. 139\u2013155. Springer, Berlin, Heidelberg (2000)"},{"key":"471_CR3","doi-asserted-by":"crossref","unstructured":"Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) Advances in Cryptology\u2014EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045, pp. 453\u2013474. Springer, Berlin, Heidelberg (2001)","DOI":"10.1007\/3-540-44987-6_28"},{"key":"471_CR4","doi-asserted-by":"crossref","unstructured":"Kobara, K., Shin, S., Strefler, M.: Partnership in key exchange protocols. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS\u201909), 161\u2013170 (2009)","DOI":"10.1145\/1533057.1533081"},{"key":"471_CR5","unstructured":"Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. https:\/\/www.cs.umd.edu\/~jkatz\/papers\/1round_AKE.pdf (2008)"},{"key":"471_CR6","unstructured":"Ninet, T.: Formal verification of the Internet Key Exchange (IKEv2) security protocol. Universite de Rennes, Thesis (2020)"},{"key":"471_CR7","unstructured":"Lowe, G.: A hierarchy of authentication specifications. Proceedings of the 10th Computer Security Foundations Workshop, 31\u201343 (1997)"},{"key":"471_CR8","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"key":"471_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/11535218_33","volume-title":"Advances in Cryptology\u2014CRYPTO 2005","author":"H Krawczyk","year":"2005","unstructured":"Krawczyk, H.: Hmqv: a high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) Advances in Cryptology\u2014CRYPTO 2005. Lecture Notes in Computer Science, vol. 3621, pp. 546\u2013566. Springer, Berlin, Heidelberg (2005)"},{"issue":"2","key":"471_CR10","first-page":"99","volume":"69","author":"T Matsumoto","year":"1986","unstructured":"Matsumoto, T., Takashima, Y., Imai, H.: On seeking smart public-key-distribution systems. Trans. Inst. Electron. Commun. Eng. Jpn. 69(2), 99\u2013106 (1986)","journal-title":"Trans. Inst. Electron. Commun. Eng. Jpn."},{"key":"471_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology\u2014CRYPTO 2003","author":"H Krawczyk","year":"2003","unstructured":"Krawczyk, H.: Sigma: the \u2018sign-and-mac\u2019 approach to authenticated diffie-hellman and its use in the ike protocols. In: Boneh, D. (ed.) Advances in Cryptology\u2014CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729, pp. 400\u2013425. Springer, Berlin, Heidelberg (2003)"},{"key":"471_CR12","doi-asserted-by":"crossref","unstructured":"Seye, P.B., Sarr, A.P.: Enhanced modelling of authenticated key exchange security. In: Livraga, G., Mitchell, C. (eds.) Security and Trust Management. STM 2017. Lecture Notes in Computer Science, vol. 10547, pp. 36\u201352. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-68063-7_3"},{"key":"471_CR13","doi-asserted-by":"crossref","unstructured":"Boyd, C., Mao, W., Paterson, K.G.: Key agreement using statically keyed authenticators. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) Applied Cryptography and Network Security. ACNS 2004. Lecture Notes in Computer Science, vol. 3089, pp. 248\u2013262. Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24852-1_18"},{"key":"471_CR14","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10207-006-0011-9","volume":"6","author":"L Chen","year":"2007","unstructured":"Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213\u2013241 (2007)","journal-title":"Int. J. Inf. Secur."},{"key":"471_CR15","doi-asserted-by":"crossref","unstructured":"Popescu, C.: A secure authenticated key agreement protocol. Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference, 783\u2013786 (2004)","DOI":"10.1109\/MELCON.2004.1347048"},{"key":"471_CR16","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Crytography and Coding. Cryptography and Coding 1997. Lecture Notes in Computer Science, vol. 1355, pp. 30\u201345. Springer, Berlin, Heidelberg (1997)","DOI":"10.1007\/BFb0024447"},{"key":"471_CR17","unstructured":"NIST: Skipjack and KEA Algorithm Specifications. https:\/\/csrc.nist.gov\/CSRC\/media\/\/Projects\/Cryptographic-Algorithm-Validation-Program\/documents\/skipjack\/skipjack.pdf (1998)"},{"key":"471_CR18","unstructured":"Alekseev, E.K., Akhmetzyanova, L.R., Bozhko, A.A., Kutsenok, K.O., Kyazhin, S.N.: On adversary capabilities for attacks on a certain class of authenticated key establishment protocols. RusCrypto\u2019 (2022) https:\/\/www.ruscrypto.ru\/resource\/archive\/rc2022\/files\/02_alekseyev_akhmetzyanova_kutsenok_kyazhin.pdf (2022)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00471-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00471-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00471-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T04:34:00Z","timestamp":1729053240000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00471-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,10]]},"references-count":18,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["471"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00471-4","relation":{},"ISSN":["2263-8733"],"issn-type":[{"type":"electronic","value":"2263-8733"}],"subject":[],"published":{"date-parts":[[2023,3,10]]},"assertion":[{"value":"2 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}