Dec 14, 2006 · Security on Aydos et al's Elliptic Curve Cryptography Based Wireless Authentication Protocol[J]. Journal of Computer Research and Development, ...
It is further shown in this paper that Aydos et al's protocol is vulnerable to man-in-the-middle attack from any attacker not restricted on the inside attacker.
This paper further shows that Aydos et al.'s pro- tocol is vulnerable to man-in-the-middle attack from any attacker, not restricts to internal attackers. Then, ...
It is shown that Aydos et al.'s protocol is vulnerable to man-in-the-middle attack from any attacker not restricted on the inside attacker and a forging ...
Abstract: Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant ...
People also ask
Is elliptic curve cryptography secure?
What are the vulnerabilities of elliptic curve cryptography?
What is an example of an elliptic curve cryptography?
Who invented elliptic curve cryptography?
Aydos et al. [9] describes an authenticated group key agreement protocol for wireless communication which is based on elliptic curve digital signature algorithm ...
Applying an elliptic curve au- thentication protocol the memory and the power consumption are lower. Another advantage is that this kind of protocols are secure ...
A mutual authentication and key establishment protocol proposed by Aydoset al, for wireless communication based on elliptic curve cryptography can provide ...
A mutual authentication and key establishment protocol proposed by Aydoset al, for wireless communication based on elliptic curve cryptography can provide ...
Jun 13, 2000 · Aydos, B. Sunar, and ç. K. Koc. An elliptic curve cryptography based authentication and key agreement protocol for wireless communication.