Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting (original) (raw)
Related papers
On the security of a password-only authenticated three-party key exchange protocol
Cryptanalysis of an efficient three‐party password‐based key exchange scheme
2012
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications, 2013
Lecture Notes in Computer Science, 2006
Cryptanalysis of simple three-party key exchange protocol
Computers & Security, 2008
Efficient Three Party Key Exchange Protocol
Bulletin of Electrical Engineering and Informatics, 2012
Security weakness in a three-party password-based key exchange protocol using Weil pairing
2005
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆
2004
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
2008
One-Round Protocols for Two-Party Authenticated Key Exchange
Applied Cryptography and Network Security, 2004
Efficient provably secure password-based explicit authenticated key agreement
Pervasive and Mobile Computing, 2015
Systematic Design of Two-Party Authentication Protocols
Advances in Cryptology — CRYPTO ’91, 1992
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Lecture Notes in Computer Science, 2007
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications, 2012
2007
A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
IOSR Journal of Computer Engineering, 2014
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences, 2010
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
2005
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Lecture Notes in Computer Science, 2008
Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem
International Journal of Network Security, 2013
Authenticated Key Exchange Secure Against Dictionary Attacks
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Journal of Computer Science and Technology, 2009
An efficient client–client password-based authentication scheme with provable security
The Journal of Supercomputing, 2014
Provably secure and efficient certificateless authenticated tripartite key agreement protocol
Mathematical and Computer Modelling - MATH COMPUT MODELLING
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group