-
3
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Innsbruck, Austria 10.1007/3-540-44987-6-28 10.1007/3-540-44987-6-28
-
Canetti R, Krawczyk H (2001) Analysis of key-exchange protocols and their use for building secure channels. In: Proc of advances in cryptology - EUROCRYPT 2001, Innsbruck, Austria, pp 453-474. doi: 10.1007/3-540-44987-6-28
-
(2001)
Proc of Advances in Cryptology - EUROCRYPT 2001
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
4
-
-
47549109760
-
A round-and computation-efficient three-party authenticated key exchange protocol
-
10.1016/j.jss.2007.11.720 10.1016/j.jss.2007.11.720
-
Chen TH, Lee WB, Chen HB (2008) A round-and computation-efficient three-party authenticated key exchange protocol. J Syst Softw 81:1581-1590. doi: 10.1016/j.jss.2007.11.720
-
(2008)
J Syst Softw
, vol.81
, pp. 1581-1590
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
5
-
-
0017018484
-
New directions in cryptography
-
10.1109/TIT.1976.1055638 437208 10.1109/TIT.1976.1055638
-
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22(6):644-654. doi: 10.1109/TIT.1976.1055638
-
(1976)
IEEE Trans Inf Theory
, vol.226
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
6
-
-
44849118543
-
Cryptanalysis of simple three party key exchange protocol
-
10.1016/j.cose.2008.03.001 10.1016/j.cose.2008.03.001
-
Guo H, Li Z, Mu Y, Zhang X (2008) Cryptanalysis of simple three party key exchange protocol. Comput Secur 27(1):16-21. doi: 10.1016/j.cose.2008.03.001
-
(2008)
Comput Secur
, vol.27
, Issue.1
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
7
-
-
84887950204
-
An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
http://eprint.iacr.org/2011/195.pdf
-
He D, Chen Y (2011) An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. In: IACR cryptology eprint archive. http://eprint.iacr.org/2011/195.pdf
-
(2011)
IACR Cryptology Eprint Archive
-
-
He, D.1
Chen, Y.2
-
8
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
10.1016/j.inffus.2011.01.001 10.1016/j.inffus.2010.02.001
-
He D, Chen J, Hu J (2011) An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf Fusion 13:223-230. doi: 10.1016/j.inffus.2011.01.001
-
(2011)
Inf Fusion
, vol.13
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
9
-
-
74149086367
-
Two proposed identity-based three-party authenticated key agreement protocols from pairings
-
10.1016/j.cose.2009.08.006 10.1016/j.cose.2009.08.006
-
Hölbl M, Welzer T, Brumen B (2010) Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput Secur 29(2):244-252. doi: 10.1016/j.cose.2009.08.006
-
(2010)
Comput Secur
, vol.29
, Issue.2
, pp. 244-252
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
10
-
-
80052774690
-
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
10.1016/j.jss.2011.06.061 10.1016/j.jss.2011.06.061
-
Islam SH, Biswas GP (2011) A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J Syst Softw 84(11):1892-1898. doi: 10.1016/j.jss.2011.06. 061
-
(2011)
J Syst Softw
, vol.84
, Issue.11
, pp. 1892-1898
-
-
Islam, S.H.1
Biswas, G.P.2
-
11
-
-
67649746889
-
An unknown key-share attack on the MQV key agreement protocol
-
10.1145/501978.501981 10.1145/501978.501981
-
Kaliski B Jr (2001) An unknown key-share attack on the MQV key agreement protocol. ACM Trans Inf Syst Secur 4:275-288. doi: 10.1145/501978.501981
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, pp. 275-288
-
-
Kaliski, Jr.B.1
-
12
-
-
84968503742
-
Elliptic curve cryptosystem
-
866109 10.1090/S0025-5718-1987-0866109-5
-
Koblitz N (1987) Elliptic curve cryptosystem. Math Comput 48:203-209
-
(1987)
Math Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
84855269122
-
On security of a practical three-party key exchange protocol with round efficiency
-
2369557
-
Lee CC, Chang YF (2008) On security of a practical three-party key exchange protocol with round efficiency. Inf Technol Control 37(4):333-335
-
(2008)
Inf Technol Control
, vol.37
, Issue.4
, pp. 333-335
-
-
Lee, C.C.1
Chang, Y.F.2
-
14
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
10.1016/j.amc.2004.06.129 2169747 10.1016/j.amc.2004.06.129
-
Lee SW, Kim HS, Yoo KY (2005) Efficient verifier-based key agreement protocol for three parties without server's public key. Appl Math Comput 167(2):996-1003. doi: 10.1016/j.amc.2004.06.129
-
(2005)
Appl Math Comput
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
15
-
-
33846817471
-
Simple three-party key exchange protocol
-
10.1016/j.cose.2006.08.005 10.1016/j.cose.2006.08.005
-
Lu R, Cao Z (2007) Simple three-party key exchange protocol. Comput Secur 26(1):94-97. doi: 10.1016/j.cose.2006.08.005
-
(2007)
Comput Secur
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
16
-
-
85015402934
-
Use of elliptic curves in cryptography
-
85 10.1007/3-540-39799-X-31
-
Miller VS (1986) Use of elliptic curves in cryptography. In: Proc of advances in cryptology - CRYPTO, vol 85, pp 417-426
-
(1986)
Proc of Advances in Cryptology - CRYPTO
, pp. 417-426
-
-
Miller, V.S.1
-
17
-
-
77957204726
-
Improved three party EKE protocol
-
Padmavathy R (2010) Improved three party EKE protocol. Inf Technol Control 39(3):220-226
-
(2010)
Inf Technol Control
, vol.39
, Issue.3
, pp. 220-226
-
-
Padmavathy, R.1
-
18
-
-
78651538975
-
An enhanced three-party authentication key exchange protocol for mobile commerce environments
-
10.4304/jcm.5.5.436-443
-
Tan Z (2010) An enhanced three-party authentication key exchange protocol for mobile commerce environments. J Commun 5:436-443. doi: 10.4304/jcm.5.5.436- 443
-
(2010)
J Commun
, vol.5
, pp. 436-443
-
-
Tan, Z.1
-
19
-
-
33947405259
-
An efficient two-party identity-based key exchange protocol
-
Tseng YM (2007) An efficient two-party identity-based key exchange protocol. Informatica 18:125-136
-
(2007)
Informatica
, vol.18
, pp. 125-136
-
-
Tseng, Y.M.1
-
20
-
-
63049116480
-
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
-
10.1016/j.cose.2008.11.008 10.1016/j.cose.2008.11.008
-
Yang JH, Chang CC (2009) An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28:138-143. doi: 10.1016/j.cose.2008.11.008
-
(2009)
Comput Secur
, vol.28
, pp. 138-143
-
-
Yang, J.H.1
Chang, C.C.2
-
21
-
-
68949161753
-
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
10.1016/j.jss.2009.03.075 10.1016/j.jss.2009.03.075
-
Yang JH, Chang CC (2009) An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J Syst Softw 82:1497-1502. doi: 10.1016/j.jss.2009.03.075
-
(2009)
J Syst Softw
, vol.82
, pp. 1497-1502
-
-
Yang, J.H.1
Chang, C.C.2
-
22
-
-
84859178298
-
A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices
-
Yoon E, Choi S, Yoo K (2012) A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices. Int J Innov Comput Inf Control 8(4):2637-2653
-
(2012)
Int J Innov Comput Inf Control
, vol.8
, Issue.4
, pp. 2637-2653
-
-
Yoon, E.1
Choi, S.2
Yoo, K.3
-
23
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
10.1016/j.csi.2007.08.018 10.1016/j.csi.2007.08.018
-
Yoon EJ, Yoo KY (2008) Improving the novel three-party encrypted key exchange protocol. Comput Stand Interfaces 30(5):309-314. doi: 10.1016/j.csi.2007.08.018
-
(2008)
Comput Stand Interfaces
, vol.30
, Issue.5
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
24
-
-
70749138135
-
Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC
-
10.1109/CSE.2009.363 10.1109/CSE.2009.363
-
Yoon E, Yoo K (2009) Robust ID-based remote mutual authentication with key agreement protocol for mobile devices on ECC. In: Proc of 2009 international conference on computational science and engineering, pp 633-640. doi: 10.1109/CSE.2009.363
-
(2009)
Proc of 2009 International Conference on Computational Science and Engineering
, pp. 633-640
-
-
Yoon, E.1
Yoo, K.2
|