On the Security of Some Password-Based Key Agreement Schemes (original) (raw)

Development of an Efficient Password-Typed Key Agreement Scheme

Sattar Aboud

2010

View PDFchevron_right

Enhanced password-based key establishment protocol

Chris Mitchell

2005

View PDFchevron_right

Simple and efficient password-based authenticated key exchange protocol

Changshe Ma

Journal of Shanghai Jiaotong University Science, 2011

View PDFchevron_right

Authenticated Key Agreement Protocols: A Comparative Study

Scientific Research Publishing

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

Questioning the Security of Three Recent Authentication and Key Agreement Protocols

mokhtar mohammadi

IEEE Access, 2021

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

Improvement of modified authenticated key agreement protocol

Chris Mitchell

Applied Mathematics and Computation, 2003

View PDFchevron_right

A New Security Model for Authenticated Key Agreement

Philippe Elbaz-vincent

Security and Cryptography for Networks, 2010

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

Efficient Password-Typed Key Agreement Scheme

Sattar Aboud

arXiv (Cornell University), 2010

View PDFchevron_right

An Improved Key Agreement Authentication Scheme Based on an Anonymous Password

Cheng-ying Yang

International Journal of Electrical and Electronic Engineering & Telecommunications

View PDFchevron_right

A Password-Based Key Establishment Protocol with Symmetric Key Cryptography

imran ran

2008

View PDFchevron_right

Efficient provably secure password-based explicit authenticated key agreement

Neeraj Kumar

Pervasive and Mobile Computing, 2015

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

On the security of an efficient two-pass key agreement protocol

Yuh-Min Tseng

Computer Standards & Interfaces, 2004

View PDFchevron_right

Cryptanalysis of a client-to-client password-authenticated key agreement protocol

Fengjiao Wang

View PDFchevron_right

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

A Secure Authenticated Key Exchange Protocol for Credential Services

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2008

View PDFchevron_right

A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords

Seungjoo Kim

View PDFchevron_right

Security Analysis of the PACE Key-Agreement Protocol

Marc Fischlin

Lecture Notes in Computer Science, 2009

View PDFchevron_right

IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange

D. Catalano

View PDFchevron_right

Security Verification for Authentication and Key Exchange Protocols, Revisited

Shinsaku Kiyomoto

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010

View PDFchevron_right

Threshold password-authenticated key exchange: (Extended abstract)

Markus Jakobsson

International Cryptology Conference, 2002

View PDFchevron_right

A note on leakage-resilient authenticated key exchange

Jung-Ah Hwang

IEEE Transactions on Wireless Communications, 2000

View PDFchevron_right

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

Zulfikar Ramzan

2006

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

Analysis of a key-establishment security protocol

Anca Jurcut

View PDFchevron_right