An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP (original) (raw)
Related papers
An Efficient Two-Party Identity-Based Key Exchange Protocol
Informatica
An Efficient Password Security of Key Exchange Protocol based on ECDLP
2010
An efficient password security of multi-party key exchange protocol based on ECDLP
2009
A Review Based Study of Key Exchange Algorithms
International Journal of Network Security and …, 2010
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
An ID-based key agreement protocol based on ECC among users of separate networks
2012 9th International ISC Conference on Information Security and Cryptology, 2012
A Comparison Study on Key Exchange-Authentication Protocol
ijcaonline.org
Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme
IEEE Access
V International Enformatika …, 2005
A New Efficient Authenticated ID-Based Group Key Agreement Protocol
2011
Lecture Notes in Computer Science, 2014
An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol
International journal of innovative computing, information & control: IJICIC
Tree and elliptic curve based efficient and secure group key agreement protocol
Journal of Information Security and Applications, 2020
SECURITY AND PRIVACY, 2019
Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC
The ISC Int'l Journal of Information Security, 2013
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Efficient identity-based authenticated key agreement protocol from pairings
Applied Mathematics and Computation, 2005
A secure ID-based signcryption scheme based on elliptic curve cryptography
International Journal of Computational Intelligence Studies, 2017
ijmer.com
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications, 2012
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
Lecture Notes in Computer Science, 2008
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences, 2012