On the security of a password-only authenticated three-party key exchange protocol (original) (raw)
Related papers
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
Lecture Notes in Computer Science, 2006
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting
Symmetry, 2015
A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆
2004
Cryptanalysis of an efficient three‐party password‐based key exchange scheme
2012
Cryptanalysis of simple three-party key exchange protocol
Computers & Security, 2008
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Efficient Three Party Key Exchange Protocol
Bulletin of Electrical Engineering and Informatics, 2012
Security weakness in a three-party password-based key exchange protocol using Weil pairing
2005
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
Authenticated Key Exchange Secure Against Dictionary Attacks
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Systematic Design of Two-Party Authentication Protocols
Advances in Cryptology — CRYPTO ’91, 1992
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
Enhanced password-based key establishment protocol
2005
Comment on four two-party authentication protocols
eprint.iacr.org
An efficient client–client password-based authentication scheme with provable security
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Lecture Notes in Computer Science, 2007
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Simple and efficient password-based authenticated key exchange protocol
Journal of Shanghai Jiaotong University Science, 2011
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications, 2000
Strengthening the security of key exchange protocols
2014
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications, 2013
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
2008
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Key Exchange
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
2005
Threshold password-authenticated key exchange (extended abstract)
ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002