An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP (original) (raw)

An Efficient Two-Party Identity-Based Key Exchange Protocol

Yuh-Min Tseng

Informatica

View PDFchevron_right

An Efficient Password Security of Key Exchange Protocol based on ECDLP

Jayaprakash Kar

View PDFchevron_right

An efficient password security of multi-party Key Exchange Protocol using secret sharing based on ECDLP

Jayaprakash Kar

2010

View PDFchevron_right

An efficient password security of multi-party key exchange protocol based on ECDLP

Jayaprakash Kar

2009

View PDFchevron_right

A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks

mohammad sabzinejad Farash

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment

Chandrasekhara Pillai P K

International Journal of Network Security and …, 2010

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

An ID-based key agreement protocol based on ECC among users of separate networks

mohammad sabzinejad Farash

2012 9th International ISC Conference on Information Security and Cryptology, 2012

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

Rukma Rekha N

IEEE Access

View PDFchevron_right

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the El …

Konstantinos Chalkias

V International Enformatika …, 2005

View PDFchevron_right

A New Efficient Authenticated ID-Based Group Key Agreement Protocol

mohammad sabzinejad Farash

2011

View PDFchevron_right

An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach

Nilanjan Sen

Lecture Notes in Computer Science, 2014

View PDFchevron_right

An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol

Yaw-Chung Chen

International journal of innovative computing, information & control: IJICIC

View PDFchevron_right

Tree and elliptic curve based efficient and secure group key agreement protocol

Arjun singh Rawat

Journal of Information Security and Applications, 2020

View PDFchevron_right

A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol

mahdi nikooghadam

SECURITY AND PRIVACY, 2019

View PDFchevron_right

Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC

mohammad sabzinejad Farash

The ISC Int'l Journal of Information Security, 2013

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Efficient identity-based authenticated key agreement protocol from pairings

Youngju Choie

Applied Mathematics and Computation, 2005

View PDFchevron_right

A secure ID-based signcryption scheme based on elliptic curve cryptography

biswojit nayak

International Journal of Computational Intelligence Studies, 2017

View PDFchevron_right

A New Scheme for Key Exchange

Debajit Sensarma

ijmer.com

View PDFchevron_right

An efficient certificateless two-party authenticated key agreement protocol

Dr Sahadeo Padhye

Computers & Mathematics with Applications, 2012

View PDFchevron_right

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

Hyotaek Lim, HoonJae LEE

Lecture Notes in Computer Science, 2008

View PDFchevron_right

An improved two-party identity-based authenticated key agreement protocol using pairings

Tatjana Welzer

Journal of Computer and System Sciences, 2012

View PDFchevron_right

Analysis of Key Exchange Protocols using Session Keys

Pranav Vyas

View PDFchevron_right