Article
Open Access
Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
-
M. B. Paterson
Published/Copyright:
February 4, 2009
Received: 2008-07-28
Revised: 2008-11-27
Published Online: 2009-02-04
Published in Print: 2008-December
© de Gruyter 2008
Articles in the same Issue
- Another look at non-standard discrete log and Diffie-Hellman problems
- Identification and signatures based on NP-hard problems of indefinite quadratic forms
- Polylogarithmic two-round argument systems
- Minimal weight expansions in Pisot bases
- Two attacks on a sensor network key distribution scheme of Cheng and Agrawal
Creative Commons
BY-NC-ND 3.0
Articles in the same Issue
- Another look at non-standard discrete log and Diffie-Hellman problems
- Identification and signatures based on NP-hard problems of indefinite quadratic forms
- Polylogarithmic two-round argument systems
- Minimal weight expansions in Pisot bases
- Two attacks on a sensor network key distribution scheme of Cheng and Agrawal