An Efficient Password Security of Key Exchange Protocol based on ECDLP (original) (raw)

An efficient password security of multi-party key exchange protocol based on ECDLP

Jayaprakash Kar

2009

View PDFchevron_right

An efficient password security of multi-party Key Exchange Protocol using secret sharing based on ECDLP

Jayaprakash Kar

2010

View PDFchevron_right

An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP

Jayaprakash Kar

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

Mukesh Kumar

View PDFchevron_right

An Efficient and Secure Three-Pass Authenticated Key. Agreement Elliptic Curve Based Protocol

Yaw-Chung Chen

International journal of innovative computing, information & control: IJICIC

View PDFchevron_right

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment

Chandrasekhara Pillai P K

International Journal of Network Security and …, 2010

View PDFchevron_right

An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server’s Public-Keys and Symmetric Cryptosystems

mohammad sabzinejad Farash

View PDFchevron_right

Implementation and Secured Authentication Key using Elliptic Curve Cryptography

IJIRIS Journal Division

View PDFchevron_right

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the El …

Konstantinos Chalkias

V International Enformatika …, 2005

View PDFchevron_right

Secure Group Communication based on Elliptic Curve Cryptography

manisha manjul

View PDFchevron_right

An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment

ASHISH TOMAR

Wireless Personal Communications, 2019

View PDFchevron_right

A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

Hyotaek Lim, HoonJae LEE

Lecture Notes in Computer Science, 2008

View PDFchevron_right

An enhanced password authenticated key exchange protocol without server public keys

Hamid Karimnejad

2012 International Conference on ICT Convergence (ICTC), 2012

View PDFchevron_right

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

mohammad sabzinejad Farash

Journal of King Saud University - Computer and Information Sciences, 2017

View PDFchevron_right

Cryptanalysis of an efficient three‐party password‐based key exchange scheme

Marcos Simplício

2012

View PDFchevron_right

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Tanmoy Maitra

Security and Communication Networks, 2016

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right

An novel three-party authenticated key exchange protocol using one-time key

Maode Ma

Journal of Network and Computer Applications, 2013

View PDFchevron_right

Elliptic curve Cryptography and Diffie-Hellman Key exchange

IOSR JM

View PDFchevron_right

A Study on Diffie-Hellman Key Exchange Protocols

M R Mishra

International Journal of Pure and Apllied Mathematics, 2017

View PDFchevron_right

Efficient Three Party Key Exchange Protocol

Manju Sanghi

Bulletin of Electrical Engineering and Informatics, 2012

View PDFchevron_right

Authenticated Distributed Group Key Agreement Protocol Using Elliptic Curve Secret Sharing Scheme

Rukma Rekha N

IEEE Access

View PDFchevron_right

A new two-pass key agreement protocol

Magdy Saeb

… and Human Science, …, 2003

View PDFchevron_right

Tree and elliptic curve based efficient and secure group key agreement protocol

Arjun singh Rawat

Journal of Information Security and Applications, 2020

View PDFchevron_right

Elliptic Curve Cryptography and Security Protocol

vasu srungaram

GIS SCIENCE

View PDFchevron_right

A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol

mahdi nikooghadam

SECURITY AND PRIVACY, 2019

View PDFchevron_right

Simple and efficient password-based authenticated key exchange protocol

Changshe Ma

Journal of Shanghai Jiaotong University Science, 2011

View PDFchevron_right

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol

Ashwin Chandrasekar

View PDFchevron_right

Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters

Herve Chabanne

Lecture Notes in Computer Science, 2010

View PDFchevron_right