{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,22]],"date-time":"2024-07-22T20:31:49Z","timestamp":1721680309325},"reference-count":18,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1016\/j.cose.2008.03.001","type":"journal-article","created":{"date-parts":[[2008,3,15]],"date-time":"2008-03-15T14:48:43Z","timestamp":1205592523000},"page":"16-21","source":"Crossref","is-referenced-by-count":61,"title":["Cryptanalysis of simple three-party key exchange protocol"],"prefix":"10.1016","volume":"27","author":[{"given":"Hua","family":"Guo","sequence":"first","affiliation":[]},{"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Mu","sequence":"additional","affiliation":[]},{"given":"Xiyong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2008.03.001_bib9","series-title":"Financial Cryptography and Data Security \u2013 FC 2005","article-title":"Interactive Diffie\u2013Hellman assumptions with applications to password-based authentication","volume":"vol. 3570","author":"Abdalla","year":"2005"},{"key":"10.1016\/j.cose.2008.03.001_bib17","series-title":"Topics in Cryptology \u2013 CT-RSA 2005","article-title":"Simple password-based encrypted key exchange protocols","author":"Abdalla","year":"2005"},{"key":"10.1016\/j.cose.2008.03.001_bib8","series-title":"Public Key Cryptography \u2013 PKC 2005","article-title":"Password-based authenticated key exchange in the three-party setting","volume":"vol. 3386","author":"Abdalla","year":"2005"},{"key":"10.1016\/j.cose.2008.03.001_bib18","series-title":"Protocols for Authentication and Key Establishment","author":"Boyd","year":"2003"},{"key":"10.1016\/j.cose.2008.03.001_bib11","series-title":"Proceedings of APWeb'06","first-page":"830","article-title":"Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol","volume":"vol. 3841","author":"Byun","year":"2006"},{"issue":"5","key":"10.1016\/j.cose.2008.03.001_bib4","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1016\/j.csi.2003.12.001","article-title":"A novel three-party encrypted key exchange protocol","volume":"26","author":"Chang","year":"2004","journal-title":"Computer Standards and Interfaces"},{"issue":"4","key":"10.1016\/j.cose.2008.03.001_bib13","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/219282.219298","article-title":"Undetectable on-line password guessing attacks","volume":"29","author":"Ding","year":"1995","journal-title":"ACM Operating Systems Review"},{"issue":"2","key":"10.1016\/j.cose.2008.03.001_bib3","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1023\/A:1022595222606","article-title":"An efficient protocol for authenticated key agreement","volume":"28","author":"Law","year":"2003","journal-title":"Designs, Codes and Cryptography"},{"issue":"7","key":"10.1016\/j.cose.2008.03.001_bib5","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1016\/j.cose.2004.06.007","article-title":"Enhanced three-party encrypted key exchange without server public keys","volume":"23","author":"Lee","year":"2004","journal-title":"Computers and Security"},{"issue":"2","key":"10.1016\/j.cose.2008.03.001_bib7","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1016\/j.amc.2004.06.129","article-title":"Efficient verifier-based key agreement protocol for three parties without server's public key","volume":"167","author":"Lee","year":"2005","journal-title":"Applied Mathematics and Computation"},{"issue":"4","key":"10.1016\/j.cose.2008.03.001_bib14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/506106.506108","article-title":"Three party-encrypted key exchange: attacks and a solution","volume":"34","author":"Lin","year":"2000","journal-title":"ACM Operating Systems Review"},{"issue":"12","key":"10.1016\/j.cose.2008.03.001_bib2","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1109\/4234.974498","article-title":"Three-party encrypted key exchange without server public-keys","volume":"5","author":"Lin","year":"2001","journal-title":"IEEE Communication Letters"},{"key":"10.1016\/j.cose.2008.03.001_bib12","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.cose.2006.08.005","article-title":"Simple three-party key exchange protocol","volume":"26","author":"Lu","year":"2007","journal-title":"Computers and Security"},{"key":"10.1016\/j.cose.2008.03.001_bib16","article-title":"Cryptanalysis of Two Provably Secure Cross-realm C2C-PAKE Protocols, INDOCRYPT'06","author":"Phan","year":"2006"},{"issue":"3","key":"10.1016\/j.cose.2008.03.001_bib1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/206826.206834","article-title":"Refinement and extension of encrypted key exchange","volume":"29","author":"Steiner","year":"1995","journal-title":"ACM Operating Systems Review"},{"key":"10.1016\/j.cose.2008.03.001_bib6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.jss.2003.11.017","article-title":"Secure key agreement protocols for three-party against guessing attacks","volume":"75","author":"Sun","year":"2005","journal-title":"The Journal of Systems and Software"},{"key":"10.1016\/j.cose.2008.03.001_bib15","article-title":"Efficient and Provably Secure Generic Construction of Three-party Password-based Authenticated Key Exchange Protocols, INDOCRYPT'06","author":"Wang","year":"2006"},{"key":"10.1016\/j.cose.2008.03.001_bib10","series-title":"Proceedings of ACISP'06","first-page":"395","article-title":"Secure Cross-Realm C2C-PAKE Protocol","volume":"vol. 4058","author":"Yin","year":"2006"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000035?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404808000035?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,31]],"date-time":"2018-12-31T01:26:42Z","timestamp":1546219602000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404808000035"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":18,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["S0167404808000035"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2008.03.001","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2008,3]]}}}