A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications (original) (raw)

Leakage-Resilient Authenticated Key Establishment Protocols

Hideki Imai

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Security of a leakage-resilient protocol for key establishment and mutual authentication

Mahdi Aiash

2007

View PDFchevron_right

Enhanced password-based key establishment protocol

Chris Mitchell

2005

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

A note on leakage-resilient authenticated key exchange

Jung-Ah Hwang

IEEE Transactions on Wireless Communications, 2000

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

A Password-Based Key Establishment Protocol with Symmetric Key Cryptography

imran ran

2008

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

Strongly Leakage-Resilient Authenticated Key Exchange

Willy Susilo

Lecture Notes in Computer Science, 2016

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Spyros Halkidis

Information Security and …, 2008

View PDFchevron_right

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol

Hideki Imai

Lecture Notes in Computer Science, 2007

View PDFchevron_right

A new family of authentication protocols

Harry Manifavas, Bruno Crispo

ACM SIGOPS …, 1998

View PDFchevron_right

Authentication and key agreement via memorable password

sindulakshmi l.narayanan

ISOC Network and Distributed System Security …, 2001

View PDFchevron_right

An efficient client–client password-based authentication scheme with provable security

mohammad sabzinejad Farash

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

Weaknesses in a leakage-resilient authenticated key transport protocol

Chris Mitchell

2005

View PDFchevron_right

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

Zulfikar Ramzan

2006

View PDFchevron_right

Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks

Jonathan Katz

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Strongly leakage resilient authenticated key exchange, revisited

Willy Susilo

Designs, Codes and Cryptography, 2019

View PDFchevron_right

SAKA-HM: A Secure Server-based Key Establishment Protocol

Dea Putra

View PDFchevron_right

A Leakage-resilient ID-based Authenticated Key Exchange Protocol with a Revocation Mechanism

Yuh-Min Tseng

IEEE Access

View PDFchevron_right

The kryptoknight family of light-weight protocols for authentication and key distribution

Refik Molva

1995

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

Yuh-Min Tseng

IEEE Access

View PDFchevron_right

An Efficient Key Agreement Protocol for Secure Authentication

Eui-nam Huh

Lecture Notes in Computer Science, 2004

View PDFchevron_right

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

Password-authenticated session-key generation on the internet in the plain model

Abhishek Jain

Advances in Cryptology–CRYPTO 2010, 2010

View PDFchevron_right

A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants

Yuh-Min Tseng

The Computer Journal, 2005

View PDFchevron_right

Threshold password-authenticated key exchange (extended abstract)

Markus Jakobsson

ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002

View PDFchevron_right

Efficient provably secure password-based explicit authenticated key agreement

Neeraj Kumar

Pervasive and Mobile Computing, 2015

View PDFchevron_right