A Non-Repudiable Biased Bitstring Key Agreement Protocol (NBBKAP) Using Conjugacy Problem in Non-abelian Group (original) (raw)

Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level

Eligijus Sakalauskas

Informatica

View PDFchevron_right

Key Agreement Protocol Using Conjugacy Classes of Finitely Generated Group

Michael John

View PDFchevron_right

An authenticated key agreement protocol using conjugacy problem in braid groups

Sunder Lal

International Journal of Network Security, 2008

View PDFchevron_right

A New Efficient Authenticated ID-Based Group Key Agreement Protocol

mohammad sabzinejad Farash

2011

View PDFchevron_right

A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near - Rings

Varun Shukla

IACR Cryptol. ePrint Arch., 2020

View PDFchevron_right

Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

Yuh-Min Tseng

Informatica

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants

Yuh-Min Tseng

TheScientificWorldJournal, 2014

View PDFchevron_right

A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group

Dr. Abhimanyu Kumar

Wireless Personal Communications, 2015

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Yuh-Min Tseng

Computer Networks, 2012

View PDFchevron_right

Authenticated Group Key Agreement Protocols for Error Detection and Correction

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019

View PDFchevron_right

Public key cryptosystem and a key exchange protocol using tools of non-abelian group

Manju Sanghi

2010

View PDFchevron_right

Asymmetric Group Key Agreement

qianhong wu

2009

View PDFchevron_right

A Multi-Party Non-Repudiation Protocol for Exchange of Different Messages

Javier Miranda López

Security and Privacy in the Age of Uncertainty, 2003

View PDFchevron_right

Provably secure and efficient identification and key agreement protocol with user anonymity

Chin-Laung Lei

Journal of Computer and System Sciences, 2011

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

A Multi-Party Non-Repudiation Protocol

Olivier Markowitch

Information Security for Global Information Infrastructures, 2000

View PDFchevron_right

An Extended Identity Based Authenticated Asymmetric Group Key Agreement Protocol

Siva Ranjani

Int. J. Netw. Secur., 2015

View PDFchevron_right

A Multi-party Optimistic Non-repudiation Protocol

Olivier Markowitch

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Tripartite Key Agreement Protocol using Conjugacy Problem in Braid Groups

Varun Shukla

International Journal of Computer Applications, 2011

View PDFchevron_right

A zero-knowledge undeniable signature scheme in non-abelian group setting

Tony Thomas

International Journal of Network Security, 2008

View PDFchevron_right

Improved Two-Party ID-Based Authenticated Key Agreement Protocol

Felix Valynte

View PDFchevron_right

A Dynamic ID Based Authenticated Group Key Agreement Protocol from Pairing

shruti nathani

Int. J. Netw. Secur., 2019

View PDFchevron_right

A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY

IRJET Journal

View PDFchevron_right

IRJET-A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY

IRJET Journal

View PDFchevron_right

Two improved two-party identity-based authenticated key agreement protocols

Marko Hölbl, Tatjana Welzer

Computer Standards & Interfaces, 2009

View PDFchevron_right