On simple and secure key distribution (original) (raw)

A Cryptographic Keys Transfer Protocol for Secure Communicating Systems

Traian MUNTEAN

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Konstantinos Chalkias

Information Security and …, 2008

View PDFchevron_right

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti

Lecture Notes in Computer Science, 2001

View PDFchevron_right

A New Scheme for Key Exchange

Debajit Sensarma

ijmer.com

View PDFchevron_right

MUTUAL AUTHENTICATION AND SECURE KEY DISTRIBUTION IN DISTRIBUTED COMPUTING ENVIRONMENT

IAEME Publication

IAEME Publication, 2020

View PDFchevron_right

Provably secure session key distribution

Bola Bola

Proceedings of the twenty-seventh annual ACM symposium on Theory of computing - STOC '95, 1995

View PDFchevron_right

Efficient and provably secure key agreement

V. Chrissikopoulos

IFIP Advances in Information and Communication Technology, 1996

View PDFchevron_right

Provably Secure Session Key Distribution| The Three Party Case

BOLA BOLA

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

ATAL CHAUDHURI

International Journal of Computer Applications, 2011

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

The KryptoKnight family of light-weight protocols for authentication and key distribution

Amir Herzberg

IEEE/ACM Transactions on Networking, 1995

View PDFchevron_right

Secure user-identification and key distribution scheme preserving anonymity

Somanath Tripathy

International Journal of Security and Networks, 2008

View PDFchevron_right

Systematic Design of Two-Party Authentication Protocols

Amir Herzberg

Advances in Cryptology — CRYPTO ’91, 1992

View PDFchevron_right

Simulatable certificateless two-party authenticated key agreement protocol

qianhong wu

Information Sciences, 2010

View PDFchevron_right

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

A Taxonomy and Comparison of Two-Party Key Agreement Protocols

Asha Jyothi

International Journal of Research in Engineering and Technology, 2016

View PDFchevron_right

On the security of a simple three-party key exchange protocol without server's public keys

Minkyu Park

TheScientificWorldJournal, 2014

View PDFchevron_right

An Efficient Two-Party Identity-Based Key Exchange Protocol

Yuh-Min Tseng

Informatica

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

An Efficient Key Agreement Protocol for Secure Authentication

Eui-nam Huh

Lecture Notes in Computer Science, 2004

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

IRJET-A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY

IRJET Journal

View PDFchevron_right

Mplementing a Secure Key Issuing Scheme for Communication in P 2 P Networks

Annapurna Patil

2012

View PDFchevron_right

A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY

IRJET Journal

View PDFchevron_right