Password authenticated key exchange using hidden smooth subgroups (original) (raw)

n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

zhiguo wan

Journal of Computer Science and Technology, 2009

View PDFchevron_right

n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords

zhiguo wan

2007

View PDFchevron_right

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange

D. Catalano

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication

D. Catalano

Journal of Cryptology, 2007

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order

Marc Girault

Journal of Cryptology, 2006

View PDFchevron_right

Efficient Password-Authenticated Key Exchange Based on RSA

Moti Yung

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions

Hideki Imai

View PDFchevron_right

An Efficient Key Agreement Protocol for Secure Authentication

Eui-nam Huh

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Rethinking the security of some authenticated group key agreement schemes

Chris Mitchell

2004

View PDFchevron_right

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group

Siamak F Shahandashti

View PDFchevron_right

Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity

Juryon Paik

2007

View PDFchevron_right

A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWORD BASED AUTHENTICATION

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

Some aspects of group based cryptography

Sot Mathematician

View PDFchevron_right

Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures

Appala Tentu

IACR Cryptol. ePrint Arch., 2018

View PDFchevron_right

More efficient password-authenticated key exchange

sindulakshmi l.narayanan

Topics in Cryptology—CT-RSA 2001, 2001

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol

Hideki Imai

Lecture Notes in Computer Science, 2007

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

Provably-Secure and communication-efficient scheme for dynamic group key exchange

Seungjoo Kim

2004

View PDFchevron_right

A Note on Group Authentication Schemes

Afshin Zarei

International Journal of Computer Network and Information Security, 2016

View PDFchevron_right

A Simple Threshold Authenticated Key Exchange from Short Secrets

Pierre-alain Fouque

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Threshold password-authenticated key exchange (extended abstract)

Markus Jakobsson

ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002

View PDFchevron_right

On the security of group communication schemes based on symmetric key cryptosystems

Shouhuai Xu

Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05, 2005

View PDFchevron_right

A New Cryptosystem Based On Hidden Order Groups

Amitabh Saxena

View PDFchevron_right

Scalable Protocols for Authenticated Group Key Exchange

Jonathan Katz

Journal of Cryptology, 2007

View PDFchevron_right

More Efficient Password Authenticated Key Exchange Based on RSA

Rana Barua

Lecture Notes in Computer Science, 2003

View PDFchevron_right

An efficient and authenticated group-oriented cryptoscheme based on a geometric method in Internet environments

Woei-Jiunn Tsaur

Proceedings 1997 International Conference on Parallel and Distributed Systems, 1997

View PDFchevron_right

Two Formal Views of Authenticated Group Die-Hellman Key Exchange

Jean-jacques Quisquater

View PDFchevron_right

Some attacks upon authenticated group key agreement protocols

Jean-jacques Quisquater

2003

View PDFchevron_right

Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problems in Group Representation Level

Eligijus Sakalauskas

Informatica

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right