Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem (original) (raw)
Related papers
Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem
2013
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique
2011
Efficient Three Party Key Exchange Protocol
Bulletin of Electrical Engineering and Informatics, 2012
A Study on Diffie-Hellman Key Exchange Protocols
International Journal of Pure and Apllied Mathematics, 2017
A new two-pass key agreement protocol
… and Human Science, …, 2003
2010
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm
On the security of a password-only authenticated three-party key exchange protocol
A Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange
International Journal of Computer Applications, 2015
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Extended Diffie-Hellman Algorithm for Key Exchange and Management
2013
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications, 2013
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
Automatic security verification for 3-party authentication and key exchange protocols
2011 5th International Conference on Network and System Security, 2011
An Efficient Key Agreement Protocol for Secure Authentication
Lecture Notes in Computer Science, 2004
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications, 2012
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences, 2010
A Review Based Study of Key Exchange Algorithms
International Journal of Advances in Scientific Research and Engineering (ijasre), 2019
Two improved two-party identity-based authenticated key agreement protocols
Computer Standards & Interfaces, 2009
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆
2004