-
1
-
-
24144443144
-
-
M. Abdalla, D. Pointcheval, Simple password-based encrypted key exchange protocols, in: Proc. CT-RSA'05, LNCS, vol. 3376, 2005, pp. 191-208.
-
-
-
-
2
-
-
0027726717
-
-
M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, in: Proc. First ACM Annual Conference on Computer and Communications Security, 1993, pp. 62-73.
-
-
-
-
3
-
-
84945119254
-
-
M. Bellare, P. Rogaway, Entity authentication and key distribution, in: Proc. Crypto'93, LNCS, vol. 773, 1993, pp. 232-249.
-
-
-
-
4
-
-
34948832877
-
-
M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proc. 27th ACM Symposium on the Theory of Computing, 1995, pp. 57-66.
-
-
-
-
5
-
-
84873466407
-
-
M. Bellare, P. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proc. Eurocrypt'00, LNCS, vol. 1807, 2000, pp. 139-155.
-
-
-
-
6
-
-
0026850091
-
-
S.M. Bellovin, M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, in: Proc. 1992 IEEE Symposium on Research in Security and Privacy, 1992, pp. 72-84.
-
-
-
-
7
-
-
34447321042
-
EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
-
10.1016/j.ins.2007.03.024
-
Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Information Sciences (2007) 10.1016/j.ins.2007.03.024
-
(2007)
Information Sciences
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.I.3
-
9
-
-
33747171940
-
The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
-
Choo K.-K.R., Boyd C., and Hitchcock Y. The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29 15 (2006) 2788-2797
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2788-2797
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
10
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computers Security 23 7 (2004) 571-577
-
(2004)
Computers Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
11
-
-
10444279176
-
Provably secure three-party password-authenticated key exchange, IEICE Transactions on Fundamentals of Electronics
-
Lin C.L., Wen H.A., Hwang T., and Sun H.M. Provably secure three-party password-authenticated key exchange, IEICE Transactions on Fundamentals of Electronics. Communications and Computer Sciences E87-A 11 (2004) 2990-3000
-
(2004)
Communications and Computer Sciences
, vol.E87-A
, Issue.11
, pp. 2990-3000
-
-
Lin, C.L.1
Wen, H.A.2
Hwang, T.3
Sun, H.M.4
-
12
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R., and Cao Z. Simple three-party key exchange protocol. Computers Security 26 1 (2007) 94-97
-
(2007)
Computers Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
13
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
14
-
-
34548667976
-
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
-
10.1016/j.ins.2007.06.002
-
Nam J., Paik J., Kim U.M., and Won D. Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks. Information Sciences (2007) 10.1016/j.ins.2007.06.002
-
(2007)
Information Sciences
-
-
Nam, J.1
Paik, J.2
Kim, U.M.3
Won, D.4
-
15
-
-
33751229614
-
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
-
Shim K., and Woo S.S. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Information Sciences 177 4 (2007) 1143-1151
-
(2007)
Information Sciences
, vol.177
, Issue.4
, pp. 1143-1151
-
-
Shim, K.1
Woo, S.S.2
-
16
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
Wen H.A., Lee T.F., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings - Communications 152 2 (2005) 138-143
-
(2005)
IEE Proceedings - Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
17
-
-
33644748254
-
Provably secure authenticated key exchange protocols for low power computing clients
-
Wen H.A., Lin C.L., and Hwang T. Provably secure authenticated key exchange protocols for low power computing clients. Computers Security 25 2 (2006) 106-113
-
(2006)
Computers Security
, vol.25
, Issue.2
, pp. 106-113
-
-
Wen, H.A.1
Lin, C.L.2
Hwang, T.3
|