Security weakness in a three-party password-based key exchange protocol using Weil pairing (original) (raw)

Security weakness in a three-party pairing-based protocol for password authenticated key exchange

Thiru Neels

Information Sciences, 2007

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing

Chu-hsing Lin

19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers)

View PDFchevron_right

On the security of a simple three-party key exchange protocol without server's public keys

Minkyu Park

TheScientificWorldJournal, 2014

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

Juryon Paik

Symmetry, 2015

View PDFchevron_right

Cryptanalysis of an efficient three‐party password‐based key exchange scheme

Marcos Simplício

2012

View PDFchevron_right

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆

Seungjoo Kim

2004

View PDFchevron_right

Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks

Jonathan Katz

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

Cryptanalysis of simple three-party key exchange protocol

Y. Mu

Computers & Security, 2008

View PDFchevron_right

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

Vulnerability of two multiple-key agreement protocols

mohammad sabzinejad Farash

View PDFchevron_right

Systematic Design of Two-Party Authentication Protocols

Amir Herzberg

Advances in Cryptology — CRYPTO ’91, 1992

View PDFchevron_right

On the Security of Some Password-Based Key Agreement Schemes

Chris Mitchell

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions

Hideki Imai

View PDFchevron_right

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Rekha Saraswat

2015

View PDFchevron_right

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

Hyotaek Lim, HoonJae LEE

Lecture Notes in Computer Science, 2008

View PDFchevron_right

On the security of an efficient two-pass key agreement protocol

Yuh-Min Tseng

Computer Standards & Interfaces, 2004

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Konstantinos Chalkias

Information Security and …, 2008

View PDFchevron_right

Efficient Three Party Key Exchange Protocol

Manju Sanghi

Bulletin of Electrical Engineering and Informatics, 2012

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem

Manju Sanghi

International Journal of Network Security, 2013

View PDFchevron_right

Insider Impersonation Attack on a Tripartite ID-Based Authenticated Key Agreement Protocol with Bilinear Pairings

HoonJae LEE

2008 4th International Conference on Next Generation Web Services Practices, 2008

View PDFchevron_right

Strongly leakage resilient authenticated key exchange, revisited

Willy Susilo

Designs, Codes and Cryptography, 2019

View PDFchevron_right

CIL Security Proof for a Password-Based Key Exchange

Yassine Lakhnech

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Security of a leakage-resilient protocol for key establishment and mutual authentication

Mahdi Aiash

2007

View PDFchevron_right

Weakness of Shim's new ID-based tripartite multiple-key agreement protocol

Chu-hsing Lin

WSEAS Transactions on Information …, 2006

View PDFchevron_right

doi:10.1093/comjnl/bxh111 A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants

Yuh-Min Tseng

2008

View PDFchevron_right

Simple and efficient password-based authenticated key exchange protocol

Changshe Ma

Journal of Shanghai Jiaotong University Science, 2011

View PDFchevron_right

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol

Hideki Imai

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction

Suvradip Chakraborty

View PDFchevron_right

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group

Siamak F Shahandashti

2020

View PDFchevron_right