Password authenticated key exchange using hidden smooth subgroups (original) (raw)
Related papers
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Journal of Computer Science and Technology, 2009
2007
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
Journal of Cryptology, 2007
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Journal of Cryptology, 2006
Efficient Password-Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science, 2006
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
An Efficient Key Agreement Protocol for Secure Authentication
Lecture Notes in Computer Science, 2004
Rethinking the security of some authenticated group key agreement schemes
2004
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
2007
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWORD BASED AUTHENTICATION
Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)
Some aspects of group based cryptography
IACR Cryptol. ePrint Arch., 2018
More efficient password-authenticated key exchange
Topics in CryptologyCT-RSA 2001, 2001
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Lecture Notes in Computer Science, 2007
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
Provably-Secure and communication-efficient scheme for dynamic group key exchange
2004
A Note on Group Authentication Schemes
International Journal of Computer Network and Information Security, 2016
A Simple Threshold Authenticated Key Exchange from Short Secrets
Lecture Notes in Computer Science, 2005
Threshold password-authenticated key exchange (extended abstract)
ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05, 2005
A New Cryptosystem Based On Hidden Order Groups
Scalable Protocols for Authenticated Group Key Exchange
Journal of Cryptology, 2007
More Efficient Password Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science, 2003
Proceedings 1997 International Conference on Parallel and Distributed Systems, 1997
Two Formal Views of Authenticated Group Die-Hellman Key Exchange
Some attacks upon authenticated group key agreement protocols
2003
Informatica
A New Secure Protocol for Authenticated Key Agreement
International Journal of Engineering and Technology, 2013