A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications (original) (raw)
Related papers
Leakage-Resilient Authenticated Key Establishment Protocols
Lecture Notes in Computer Science, 2003
Security of a leakage-resilient protocol for key establishment and mutual authentication
2007
Enhanced password-based key establishment protocol
2005
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications, 2000
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
A Password-Based Key Establishment Protocol with Symmetric Key Cryptography
2008
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Strongly Leakage-Resilient Authenticated Key Exchange
Lecture Notes in Computer Science, 2016
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Lecture Notes in Computer Science, 2007
A new family of authentication protocols
ACM SIGOPS …, 1998
Authentication and key agreement via memorable password
ISOC Network and Distributed System Security …, 2001
An efficient client–client password-based authentication scheme with provable security
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
Weaknesses in a leakage-resilient authenticated key transport protocol
2005
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
2006
Lecture Notes in Computer Science, 2006
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography, 2019
SAKA-HM: A Secure Server-based Key Establishment Protocol
A Leakage-resilient ID-based Authenticated Key Exchange Protocol with a Revocation Mechanism
IEEE Access
The kryptoknight family of light-weight protocols for authentication and key distribution
1995
Authenticated Key Exchange Secure Against Dictionary Attacks
Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model
IEEE Access
An Efficient Key Agreement Protocol for Secure Authentication
Lecture Notes in Computer Science, 2004
Password-authenticated session-key generation on the internet in the plain model
Advances in Cryptology–CRYPTO 2010, 2010
A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants
The Computer Journal, 2005
Threshold password-authenticated key exchange (extended abstract)
ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002
Efficient provably secure password-based explicit authenticated key agreement
Pervasive and Mobile Computing, 2015