Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions.
Kyung-Ah ShimPublished in: Comput. Stand. Interfaces (2007)
Keyphrases
- hash functions
- key agreement protocol
- provably secure
- similarity search
- diffie hellman
- locality sensitive
- secret key
- encryption scheme
- hamming distance
- locality sensitive hashing
- hamming space
- nearest neighbor search
- signature scheme
- data distribution
- hashing methods
- high dimensional
- authentication protocol
- security issues