Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem (original) (raw)

Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem

Manju Sanghi

2013

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique

Jayaprakash Kar

2011

View PDFchevron_right

Efficient Three Party Key Exchange Protocol

Manju Sanghi

Bulletin of Electrical Engineering and Informatics, 2012

View PDFchevron_right

A Study on Diffie-Hellman Key Exchange Protocols

M R Mishra

International Journal of Pure and Apllied Mathematics, 2017

View PDFchevron_right

A new two-pass key agreement protocol

Magdy Saeb

… and Human Science, …, 2003

View PDFchevron_right

A secure deniable authentication protocol based on Bilinear Diffie Hellman algorithm, Cryptology eprint Archive

Jayaprakash Kar

2010

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm

Jayaprakash Kar

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

A Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange

Varun Shukla

International Journal of Computer Applications, 2015

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

Extended Diffie-Hellman Algorithm for Key Exchange and Management

Akhil Kaushik

2013

View PDFchevron_right

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Rekha Saraswat

2015

View PDFchevron_right

Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

Muath Alshaikh

Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, 2021

View PDFchevron_right

An novel three-party authenticated key exchange protocol using one-time key

Maode Ma

Journal of Network and Computer Applications, 2013

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

Automatic security verification for 3-party authentication and key exchange protocols

Shinsaku Kiyomoto

2011 5th International Conference on Network and System Security, 2011

View PDFchevron_right

An Efficient Key Agreement Protocol for Secure Authentication

Eui-nam Huh

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Security weakness in a three-party pairing-based protocol for password authenticated key exchange

Thiru Neels

Information Sciences, 2007

View PDFchevron_right

On the security of a simple three-party key exchange protocol without server's public keys

Minkyu Park

TheScientificWorldJournal, 2014

View PDFchevron_right

An efficient certificateless two-party authenticated key agreement protocol

Dr Sahadeo Padhye

Computers & Mathematics with Applications, 2012

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Simulatable certificateless two-party authenticated key agreement protocol

qianhong wu

Information Sciences, 2010

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

Prevention of Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Algorithm using Proposed Hash Function

Editor Ijasre

International Journal of Advances in Scientific Research and Engineering (ijasre), 2019

View PDFchevron_right

Two improved two-party identity-based authenticated key agreement protocols

Marko Hölbl, Tatjana Welzer

Computer Standards & Interfaces, 2009

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆

Seungjoo Kim

2004

View PDFchevron_right