Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme (original) (raw)
Related papers
Cryptanalysis of a client-to-client password-authenticated key agreement protocol
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
2006
An enhanced password authenticated key exchange protocol without server public keys
2012 International Conference on ICT Convergence (ICTC), 2012
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
A Secure and Efficient Two-Server Password Only Authenticated Key Exchange
IOSR Journal of Computer Engineering, 2014
On the security of a password-only authenticated three-party key exchange protocol
Enhanced password-based key establishment protocol
2005
Simple and efficient password-based authenticated key exchange protocol
Journal of Shanghai Jiaotong University Science, 2011
An efficient client–client password-based authentication scheme with provable security
Efficient Client-to-Client Password Authenticated Key Exchange
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications, 2000
Cryptanalysis of an efficient three‐party password‐based key exchange scheme
2012
A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols
2015
Leakage-Resilient Authenticated Key Establishment Protocols
Lecture Notes in Computer Science, 2003
A Secure Authenticated Key Exchange Protocol for Credential Services
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
E-business and …, 2009
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
Security Enhancement and Modular Treatment towards Authenticated Key Exchange
Lecture Notes in Computer Science, 2010
Authenticated Key Exchange Secure Against Dictionary Attacks
Cryptanalysis of a Known Key Exchange Password Scheme
International Journal of Advanced Research
Strengthening the security of key exchange protocols
2014
On the security of an efficient two-pass key agreement protocol
Computer Standards & Interfaces, 2004
Secure Authenticated Key Exchange Protocol for Credential Services
DESIDOC Journal of Library & Information Technology, 2009
Security Verification for Authentication and Key Exchange Protocols, Revisited
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010
A Password-Based Key Establishment Protocol with Symmetric Key Cryptography
2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2008
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences, 2007
A New Security Model for Authenticated Key Agreement
Security and Cryptography for Networks, 2010
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
2006