An novel three-party authenticated key exchange protocol using one-time key (original) (raw)

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

Efficient Three Party Key Exchange Protocol

Manju Sanghi

Bulletin of Electrical Engineering and Informatics, 2012

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Rekha Saraswat

2015

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

mohammad sabzinejad Farash

Journal of King Saud University - Computer and Information Sciences, 2017

View PDFchevron_right

Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)

Mahdi Aiash

2008

View PDFchevron_right

Cryptanalysis of simple three-party key exchange protocol

Y. Mu

Computers & Security, 2008

View PDFchevron_right

An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol

Yaw-Chung Chen

International journal of innovative computing, information & control: IJICIC

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

Juryon Paik

Symmetry, 2015

View PDFchevron_right

On the security of a simple three-party key exchange protocol without server's public keys

Minkyu Park

TheScientificWorldJournal, 2014

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

Hyotaek Lim, HoonJae LEE

Lecture Notes in Computer Science, 2008

View PDFchevron_right

Improved G-3PAKE Protocol with Formal Verification

Manju Sanghi

International Journal of Information and Network Security (IJINS), 2012

View PDFchevron_right

Automatic security verification for 3-party authentication and key exchange protocols

Shinsaku Kiyomoto

2011 5th International Conference on Network and System Security, 2011

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

Cryptanalysis of an efficient three‐party password‐based key exchange scheme

Marcos Simplício

2012

View PDFchevron_right

A new two-pass key agreement protocol

Magdy Saeb

… and Human Science, …, 2003

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Simple Three Party Key Exchange Protocols via Twin Diffie-Hellman Problem

Manju Sanghi

International Journal of Network Security, 2013

View PDFchevron_right

Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak

An Braeken

Sensors, 2020

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

mohammad sabzinejad Farash

View PDFchevron_right

Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol

mohammad sabzinejad Farash

IACR Cryptology ePrint Archive, 2011

View PDFchevron_right

A weakness in Sun-Chen-Hwang’s three-party key agreement protocols using passwords⋆

Seungjoo Kim

2004

View PDFchevron_right

Authenticated Key Agreement Protocols: A Comparative Study

Scientific Research Publishing

View PDFchevron_right