Abstract
A combination of the networked cryptographic devices and the password-based cryptographic standard, PKSC#5, was discussed. The basic setup of the network cryptographic device was between a device without tamper-resistance, and a server with its private key. Two phases were found to be involved with generic key retrieval protocol of such devices, initialization and key retrieval.
Original language | English |
---|---|
Pages (from-to) | 1832-1834 |
Number of pages | 3 |
Journal | IEICE Transactions on Communications |
Volume | E85-B |
Issue number | 9 |
Publication status | Published - 2002 Sept |
All Science Journal Classification (ASJC) codes
- Software
- Computer Networks and Communications
- Electrical and Electronic Engineering