On simple and secure key distribution (original) (raw)
Related papers
A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science, 2001
ijmer.com
MUTUAL AUTHENTICATION AND SECURE KEY DISTRIBUTION IN DISTRIBUTED COMPUTING ENVIRONMENT
IAEME Publication, 2020
Provably secure session key distribution
Proceedings of the twenty-seventh annual ACM symposium on Theory of computing - STOC '95, 1995
Efficient and provably secure key agreement
IFIP Advances in Information and Communication Technology, 1996
Provably Secure Session Key Distribution| The Three Party Case
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique
International Journal of Computer Applications, 2011
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
A New Secure Protocol for Authenticated Key Agreement
International Journal of Engineering and Technology, 2013
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking, 1995
Secure user-identification and key distribution scheme preserving anonymity
International Journal of Security and Networks, 2008
Systematic Design of Two-Party Authentication Protocols
Advances in Cryptology — CRYPTO ’91, 1992
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences, 2010
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
A Taxonomy and Comparison of Two-Party Key Agreement Protocols
International Journal of Research in Engineering and Technology, 2016
On the security of a simple three-party key exchange protocol without server's public keys
TheScientificWorldJournal, 2014
An Efficient Two-Party Identity-Based Key Exchange Protocol
Informatica
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013
An Efficient Key Agreement Protocol for Secure Authentication
Lecture Notes in Computer Science, 2004
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
IRJET-A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY
Mplementing a Secure Key Issuing Scheme for Communication in P 2 P Networks
2012
A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY