The following pages link to (Q3374907):
Displaying 49 items.
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication (Q327431) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Simple and efficient password-based authenticated key exchange protocol (Q407442) (← links)
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Direct proof of security of Wegman-Carter authentication with partially known key (Q479440) (← links)
- Uniform encodings to elliptic curves and indistinguishable point representation (Q782846) (← links)
- Security analysis of a password-based authentication protocol proposed to IEEE 1363 (Q818140) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- Smooth NIZK arguments (Q1629410) (← links)
- Injective encodings to binary ordinary elliptic curves (Q1726692) (← links)
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (Q1761614) (← links)
- Universally composable relaxed password authenticated key exchange (Q2096488) (← links)
- Asymmetric PAKE with low computation \textit{and} communication (Q2170042) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- Composition of password-based protocols (Q2248082) (← links)
- Password-authenticated group key establishment from smooth projective hash functions (Q2299203) (← links)
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (Q2353867) (← links)
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement (Q2384520) (← links)
- Modular approach to the design and analysis of password-based security protocols (Q2385411) (← links)
- Simpler session-key generation from short random passwords (Q2482336) (← links)
- A fuzzy vault scheme (Q2491270) (← links)
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (Q2502168) (← links)
- Provably secure threshold password-authenticated key exchange (Q2507695) (← links)
- Off-line password-guessing attacks on the generalized key agreement and password authentication protocol (Q2572355) (← links)
- Fuzzy asymmetric password-authenticated key exchange (Q2692404) (← links)
- (Q2707453) (← links)
- Relatively-Sound NIZKs and Password-Based Key-Exchange (Q2900237) (← links)
- (Q2971524) (← links)
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World (Q2975804) (← links)
- Hashing into Hessian Curves (Q3011918) (← links)
- (Q3403661) (← links)
- Practical encrypted key agreement using passwords (Q3443240) (← links)
- Password-based group key agreement protocol for client-server application (Q3443266) (← links)
- Password Mistyping in Two-Factor-Authenticated Key Exchange (Q3519545) (← links)
- A simple deniable authentication protocol based on the Diffie–Hellman algorithm (Q3526043) (← links)
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead (Q3575055) (← links)
- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting (Q3600323) (← links)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (Q3637144) (← links)
- Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus (Q5040372) (← links)
- A New Client-to-Client Password-Authenticated Key Agreement Protocol (Q5322999) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework (Q5458950) (← links)
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) (Q5504621) (← links)
- Wireless-channel key exchange (Q6057200) (← links)
- Password-authenticated TLS via OPAQUE and post-handshake authentication (Q6083657) (← links)
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs (Q6162061) (← links)
- TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF (Q6487200) (← links)
- Provably Secure Scalable Distributed Authentication for Clouds (Q6488027) (← links)
- Generalized fuzzy password-authenticated key exchange from error correcting codes (Q6562582) (← links)