-
2
-
-
1442292337
-
-
Springer-Verlag, Berlin, Heidelberg, New York
-
C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment, Springer-Verlag, Berlin, Heidelberg, New York, 2003.
-
(2003)
Protocols for Authentication and Key Establishment
-
-
Boyd, C.1
Mathuria, A.2
-
3
-
-
77953567600
-
A workload characterization of elliptic curve cryptography methods in embedded environments
-
I. Branovic, R. Giorgi, and E. Martinelli, A workload characterization of elliptic curve cryptography methods in embedded environments, ACM SIGARCH Comput. Archit. News 32(3) (2004), pp. 27-34.
-
(2004)
ACM SIGARCH Comput. Archit. News
, vol.32
, Issue.3
, pp. 27-34
-
-
Branovic, I.1
Giorgi, R.2
Martinelli, E.3
-
4
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C. Chang and Y. Chang, A novel three-party encrypted key exchange protocol, Comput. Stand. Interfaces 26(2004) , pp. 471-476.
-
(2004)
Comput. Stand. Interfaces
, vol.26
, pp. 471-476
-
-
Chang, C.1
Chang, Y.2
-
5
-
-
47549109760
-
A round-and computation-efficient three-party authenticated key exchange protocol
-
T. Chen, W. Lee, and H. Chen, A round-and computation-efficient three-party authenticated key exchange protocol, J. Syst. Softw. 81(2008), 1581-1590.
-
(2008)
J. Syst. Softw
, vol.81
, pp. 1581-1590
-
-
Chen, T.1
Lee, W.2
Chen, H.3
-
6
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
DOI 10.1016/j.ins.2007.08.004, PII S0020025507003878
-
H. Chung and W. Ku, Three weaknesses in a simple three-party key exchange protocol, Inf. Sci. 178(2008), 220-229. (Pubitemid 47531793)
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.-R.1
Ku, W.-C.2
-
7
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, Protecting poorly chosen secrets from guessing attacks, IEEE J. Sel. Areas Commun. 11(1993), 648-656.
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
9
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Lia, Y. Mu, and X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Comput. Secur. 27(2008), pp. 16-21.
-
(2008)
Comput. Secur
, vol.27
, pp. 16-21
-
-
Guo, H.1
Lia, Z.2
Mu, Y.3
Zhang, X.4
-
10
-
-
4043095653
-
Efficient three-party key exchange using smart cards
-
W. Juang, Efficient three-party key exchange using smart cards, IEEE Trans. Consum. Electron. 50(2004), pp. 619-624.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, pp. 619-624
-
-
Juang, W.1
-
11
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Math. Comput. 48(1987), pp. 203-209.
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
0031381717
-
An adaptable and reliable authentication protocol for communication networks
-
T. Kwon, M. Kang, and J. Song, An adaptable and reliable authentication protocol for communication networks, Proc. of the IEEE INFOCOM'97, 1997, pp. 737-744.
-
(1997)
Proc. of the IEEE INFOCOM'97
, pp. 737-744
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
14
-
-
0031680336
-
Efficient key exchange and authentication protocols protecting weak secrets
-
T. Kwon and J. Song, Efficient key exchange and authentication protocols protecting weak secrets, IEICE Trans. Fundam. E81-A (1) (1998), pp. 156-163.
-
(1998)
IEICE Trans. Fundam
, vol.E81-A
, Issue.1
, pp. 156-163
-
-
Kwon, T.1
Song, J.2
-
15
-
-
0033157651
-
Improvement of the password-based authentication protocol (K1P) on security against replay attacks
-
T. Kwon, M. Kang, S. Jung, and J. Song, An improvement of the password based authentication protocol (K1P) on security against replay attacks, IEICE Trans. Commun. E82-B (7) (1999), pp. 991-997. (Pubitemid 30531776)
-
(1999)
IEICE Transactions on Communications
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon Taekyoung1
Kang Myeongho2
Jung Sangjoon3
Song Jooseok4
-
16
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
DOI 10.1016/j.amc.2004.06.129, PII S0096300304005454
-
S. Lee, H. Kim, and K. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key, Appl. Math. Comput. 167(2005), pp. 996-1003. (Pubitemid 41344804)
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.-W.1
Kim, H.-S.2
Yoo, K.-Y.3
-
17
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
T. Lee, T. Hwang, and C. Lin, Enhanced three-party encrypted key exchange without server public keys, Comput. Secur. 23(2004), pp. 571-577.
-
(2004)
Comput. Secur
, vol.23
, pp. 571-577
-
-
Lee, T.1
Hwang, T.2
Lin, C.3
-
18
-
-
67649791953
-
Communication-efficient three-party protocols for authentication and key agreement
-
T. Lee, J. Liu, M. Sung, S. Yang, and C. Chen, Communication-efficient three-party protocols for authentication and key agreement, Comput. Math. Appl. 58(2009), pp. 641-648.
-
(2009)
Comput. Math. Appl.
, vol.58
, pp. 641-648
-
-
Lee, T.1
Liu, J.2
Sung, M.3
Yang, S.4
Chen, C.5
-
19
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C. Lin, H. Sun, and T. Hwang, Three-party encrypted key exchange: Attacks and a solution, ACM Oper. Syst. Rev. 34(2000), pp. 12-20.
-
(2000)
ACM Oper. Syst. Rev.
, vol.34
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
20
-
-
0035701459
-
Three-party Encrypted Key Exchange without server public-keys
-
DOI 10.1109/4234.974498, PII S1089779801110720
-
C. Lin, H. Sun, M. Steiner, and T. Hwang, Three-party encrypted key exchange without server public-keys, IEEE Commun. Lett. 5(2001), pp. 497-499. (Pubitemid 34099691)
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
21
-
-
0037282439
-
A password authentication scheme with secure password updating
-
C. Lin and T. Hwang, A password authentication scheme with secure password updating, Comput. Secur. 22(2003), pp. 68-72.
-
(2003)
Comput. Secur
, vol.22
, pp. 68-72
-
-
Lin, C.1
Hwang, T.2
-
22
-
-
33748126252
-
A password authentication scheme over insecure networks
-
DOI 10.1016/j.jcss.2005.10.001, PII S0022000005001157
-
I. Liao, C. Lee, and M. Hwang, A password authentication scheme over insecure networks, J. Comput. Syst. Sci. 72(2006), pp. 727-740. (Pubitemid 44308160)
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I-E.1
Lee, C.-C.2
Hwang, M.-S.3
-
23
-
-
33846817471
-
Simple three-party key exchange protocol
-
DOI 10.1016/j.cose.2006.08.005, PII S0167404806001246
-
R. Lu and Z. Cao, Simple three-party key exchange protocol, Comput. Secur. 26(2007), pp. 94-97. (Pubitemid 46216493)
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
24
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
V. Miller, Uses of Elliptic Curves in Cryptography, Advances in Cryptology CRYPTO'85, Lecture Notesin Computer Science, 6 Vol. 218, 1986, pp. 417-426.
-
(1986)
Advances in Cryptology CRYPTO'85, Lecture Notesin Computer Science
, vol.6-218
, pp. 417-426
-
-
Miller, V.1
-
25
-
-
0004192381
-
-
CRC Press, New York
-
A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptograph, CRC Press, New York, 1997.
-
(1997)
Handbook of Applied Cryptograph
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
27
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
DOI 10.1016/j.ins.2006.09.001, PII S0020025506002714
-
J. Nam, Y. Lee, S. Kim, and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Inform. Sci. 177(6) (2007), pp. 1364-1375. (Pubitemid 46037672)
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
29
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
R. Phan, W. Yau, and B. Go, Cryptanalysis of simple three-party key exchange protocol (S-3PAKE), Inform. Sci. 178(3) (2008), pp. 2849-2856.
-
(2008)
Inform. Sci.
, vol.178
, Issue.3
, pp. 2849-2856
-
-
Phan, R.1
Yau, W.2
Go, B.3
-
30
-
-
0003855464
-
-
2nd ed., John Wiley & Sons, Inc., New York
-
B. Shneier, Applied Cryptography, 2nd ed., John Wiley & Sons, Inc., New York, 1996.
-
(1996)
Applied Cryptography
-
-
Shneier, B.1
-
31
-
-
0003987443
-
-
2nd ed., Chapman & Hall/CRC, Boca Raton, FL
-
D. Stinson, Cryptography Theory and Practice, 2nd ed., Chapman & Hall/CRC, Boca Raton, FL, 2002.
-
(2002)
Cryptography Theory and Practice
-
-
Stinson, D.1
-
32
-
-
33845638410
-
An improved deniable authentication protocol
-
J. Shao, Z. Cao, and R. Lu, An improved deniable authentication protocol, Networks 48(2006), pp. 179-181.
-
(2006)
Networks
, vol.48
, pp. 179-181
-
-
Shao, J.1
Cao, Z.2
Lu, R.3
-
33
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, Refinement and extension of encrypted key exchange, ACM Oper. Syst. Rev. 29(1995), pp. 22-30.
-
(1995)
ACM Oper. Syst. Rev.
, vol.29
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
34
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
H. Sun, B. Chen, and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, J. Syst. Softw. 75(2005), pp. 63-68.
-
(2005)
J. Syst. Softw
, vol.75
, pp. 63-68
-
-
Sun, H.1
Chen, B.2
Hwang, T.3
-
35
-
-
21944455037
-
A simple protocol for deniable authentication based on EIGamal cryptography
-
DOI 10.1002/net.20062
-
Y. Wang, J. Li, and L. Tie, A simple protocol for deniable authentication based on ElGamal cryptography, Networks 45(2005), pp. 193-194. (Pubitemid 40948516)
-
(2005)
Networks
, vol.45
, Issue.4
, pp. 193-194
-
-
Wang, Y.1
Li, J.2
Tie, L.3
-
36
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
DOI 10.1049/ip-com:20045087
-
H. Wen, T. Lee, and T. Hwang, Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, IEE Proc., Commun. 152(2) (2005), pp. 138-143. (Pubitemid 40925390)
-
(2005)
IEE Proceedings: Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.-A.1
Lee, T.-F.2
Hwang, T.3
-
37
-
-
68949161753
-
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
J. Yang and C. Chang, An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, J. Syst. Softw. 82(2009), pp. 1497-1502.
-
(2009)
J. Syst. Softw
, vol.82
, pp. 1497-1502
-
-
Yang, J.1
Chang, C.2
-
38
-
-
38149022294
-
-
Ph. D. thesis, Southern Taiwan University of Technology, Taiwan
-
H. Yeh, User authentication and key exchange protocols suitable for diverse circumstances, Ph. D. thesis, Southern Taiwan University of Technology, Taiwan, 2003, pp. 1-82.
-
(2003)
User Authentication and Key Exchange Protocols Suitable for Diverse Circumstances
, pp. 1-82
-
-
Yeh, H.1
-
39
-
-
0345098454
-
Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
-
H. Yeh, H. Sun, and T. Hwang, Efficient three-party authentication and key agreement protocols resistant to password guessing attacks, Inf. Sci. Eng. 19(2003), pp. 1059-1070.
-
(2003)
Inf. Sci. Eng.
, vol.19
, pp. 1059-1070
-
-
Yeh, H.1
Sun, H.2
Hwang, T.3
-
40
-
-
38149019162
-
Token-based authenticated key establishment protocols for three-party communication
-
E. Yoon and K. Yoo, Token-based Authenticated Key Establishment Protocols for Three-party Communication, Proc. of the Emerging Directions in Embedded and Ubiquitous Computing 2007, Lecture Notes in Computer Science, Vol. 4809, 2007, pp. 758-769.
-
(2007)
Proc. of the Emerging Directions in Embedded and Ubiquitous Computing 2007, Lecture Notes in Computer Science
, vol.4809
, pp. 758-769
-
-
Yoon, E.1
Yoo, K.2
-
41
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
DOI 10.1016/j.csi.2007.08.018, PII S0920548907000797
-
E. Yoon and K. Yoo, Improving the novel three-party encrypted key exchange protocol, Comput. Stand. Interfaces 30(2008), pp. 309-314. (Pubitemid 351609330)
-
(2008)
Computer Standards and Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
|