Security weakness in a three-party password-based key exchange protocol using Weil pairing (original) (raw)
Related papers
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
On the security of a password-only authenticated three-party key exchange protocol
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers)
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting
Symmetry, 2015
Cryptanalysis of an efficient three‐party password‐based key exchange scheme
2012
A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆
2004
Lecture Notes in Computer Science, 2006
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Cryptanalysis of simple three-party key exchange protocol
Computers & Security, 2008
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
Authenticated Key Exchange Secure Against Dictionary Attacks
Vulnerability of two multiple-key agreement protocols
Systematic Design of Two-Party Authentication Protocols
Advances in Cryptology — CRYPTO ’91, 1992
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Lecture Notes in Computer Science, 2008
On the security of an efficient two-pass key agreement protocol
Computer Standards & Interfaces, 2004
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
Efficient Three Party Key Exchange Protocol
Bulletin of Electrical Engineering and Informatics, 2012
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem
International Journal of Network Security, 2013
2008 4th International Conference on Next Generation Web Services Practices, 2008
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography, 2019
CIL Security Proof for a Password-Based Key Exchange
Lecture Notes in Computer Science, 2013
Security of a leakage-resilient protocol for key establishment and mutual authentication
2007
Weakness of Shim's new ID-based tripartite multiple-key agreement protocol
WSEAS Transactions on Information …, 2006
2008
Simple and efficient password-based authenticated key exchange protocol
Journal of Shanghai Jiaotong University Science, 2011
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Lecture Notes in Computer Science, 2007
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
2020