Pages that link to "Item:Q3455565"
From MaRDI portal
The following pages link to Efficient and secure authenticated key exchange using weak passwords (Q3455565):
Displaying 26 items.
- Shared authentication token secure against replay and weak key attacks (Q287040) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Simple and efficient password-based authenticated key exchange protocol (Q407442) (← links)
- Smooth projective hashing and two-message oblivious transfer (Q421036) (← links)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol (Q621633) (← links)
- User-aware provably secure protocols for browser-based mutual authentication (Q843365) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)
- Weakness in a RSA-based password authenticated key exchange protocol (Q975486) (← links)
- Two efficient two-factor authenticated key exchange protocols in public wireless LANs (Q1013327) (← links)
- Fuzzy password-authenticated key exchange (Q1653099) (← links)
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity (Q1750012) (← links)
- Oblivious PAKE: efficient handling of password trials (Q1799243) (← links)
- Password-authenticated group key establishment from smooth projective hash functions (Q2299203) (← links)
- Relatively-Sound NIZKs and Password-Based Key-Exchange (Q2900237) (← links)
- Secure Authentication from a Weak Key, without Leaking Information (Q3003386) (← links)
- (Q3374907) (← links)
- Practical encrypted key agreement using passwords (Q3443240) (← links)
- Password Mistyping in Two-Factor-Authenticated Key Exchange (Q3519545) (← links)
- An Efficient Password Authenticated Key Exchange Protocol with Bilinear Parings (Q3558782) (← links)
- (Q4434897) (← links)
- Reconstructing Generalized Staircase Polygons with Uniform Step Length (Q4625103) (← links)
- Applied Cryptography and Network Security (Q4680961) (← links)
- Efficient Password-Authenticated Key Exchange Based on RSA (Q5385960) (← links)
- Topics in Cryptology – CT-RSA 2005 (Q5710832) (← links)
- A Method for Making Password-Based Key Exchange Resilient to Server Compromise (Q5756641) (← links)
- Information Security and Cryptology - ICISC 2005 (Q5899283) (← links)