Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme (original) (raw)

Cryptanalysis of a client-to-client password-authenticated key agreement protocol

Fengjiao Wang

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols

Mahdi Aiash

2006

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

A Secure and Efficient Two-Server Password Only Authenticated Key Exchange

sandra bhavadas

IOSR Journal of Computer Engineering, 2014

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

Enhanced password-based key establishment protocol

Chris Mitchell

2005

View PDFchevron_right

Simple and efficient password-based authenticated key exchange protocol

Changshe Ma

Journal of Shanghai Jiaotong University Science, 2011

View PDFchevron_right

An efficient client–client password-based authentication scheme with provable security

mohammad sabzinejad Farash

View PDFchevron_right

Efficient Client-to-Client Password Authenticated Key Exchange

Yanjiang Yang

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008

View PDFchevron_right

A note on leakage-resilient authenticated key exchange

Jung-Ah Hwang

IEEE Transactions on Wireless Communications, 2000

View PDFchevron_right

Cryptanalysis of an efficient three‐party password‐based key exchange scheme

Marcos Simplício

2012

View PDFchevron_right

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Rekha Saraswat

2015

View PDFchevron_right

Leakage-Resilient Authenticated Key Establishment Protocols

Hideki Imai

Lecture Notes in Computer Science, 2003

View PDFchevron_right

A Secure Authenticated Key Exchange Protocol for Credential Services

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008

View PDFchevron_right

Two types of key-compromise impersonation attacks against one-pass key establishment protocols

Konstantinos Chalkias

E-business and …, 2009

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

On the Security of Some Password-Based Key Agreement Schemes

Chris Mitchell

Lecture Notes in Computer Science, 2005

View PDFchevron_right

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

Security Enhancement and Modular Treatment towards Authenticated Key Exchange

Changshe Ma

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

Cryptanalysis of a Known Key Exchange Password Scheme

Sattar Aboud

International Journal of Advanced Research

View PDFchevron_right

Strengthening the security of key exchange protocols

Michele Feltz

2014

View PDFchevron_right

On the security of an efficient two-pass key agreement protocol

Yuh-Min Tseng

Computer Standards & Interfaces, 2004

View PDFchevron_right

Secure Authenticated Key Exchange Protocol for Credential Services

Dr. R Balakrishna

DESIDOC Journal of Library & Information Technology, 2009

View PDFchevron_right

Security Verification for Authentication and Key Exchange Protocols, Revisited

Shinsaku Kiyomoto

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010

View PDFchevron_right

A Password-Based Key Establishment Protocol with Symmetric Key Cryptography

E. Anarim

2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

Security weakness in a three-party pairing-based protocol for password authenticated key exchange

Thiru Neels

Information Sciences, 2007

View PDFchevron_right

A New Security Model for Authenticated Key Agreement

Philippe Elbaz-vincent

Security and Cryptography for Networks, 2010

View PDFchevron_right

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

Zulfikar Ramzan

2006

View PDFchevron_right