Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) (original) (raw)
Related papers
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
Cryptanalysis of simple three-party key exchange protocol
Computers & Security, 2008
Cryptanalysis of an efficient three‐party password‐based key exchange scheme
2012
On the security of a password-only authenticated three-party key exchange protocol
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting
Symmetry, 2015
Efficient Three Party Key Exchange Protocol
Bulletin of Electrical Engineering and Informatics, 2012
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications, 2013
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
2005
A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆
2004
Improved G-3PAKE Protocol with Formal Verification
International Journal of Information and Network Security (IJINS), 2012
Security weakness in a three-party password-based key exchange protocol using Weil pairing
2005
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem
International Journal of Network Security, 2013
Lecture Notes in Computer Science, 2006
2007
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Journal of Computer Science and Technology, 2009
Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol
Journal of Physics: Conference Series, 2019
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Simple Three Party Key Exchange Protocol via Twin Diffie-Hellman Problem
2013
Simple and efficient password-based authenticated key exchange protocol
Journal of Shanghai Jiaotong University Science, 2011
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Lecture Notes in Computer Science, 2008
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013
Systematic Design of Two-Party Authentication Protocols
Advances in Cryptology — CRYPTO ’91, 1992
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
A Review Based Study of Key Exchange Algorithms
Automatic security verification for 3-party authentication and key exchange protocols
2011 5th International Conference on Network and System Security, 2011