Loading…
Attacks on improved key distribution protocols with perfect reparability
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply t...
Saved in:
Main Authors: | , |
---|---|
Format: | Default Conference proceeding |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/5694 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|