Pages that link to "Item:Q867668"
From MaRDI portal
The following pages link to Cryptanalysis of tripartite and multi-party authenticated key agreement protocols (Q867668):
Displaying 23 items.
- A round-optimal three-party ID-based authenticated key agreement protocol (Q425537) (← links)
- A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700) (← links)
- Provably secure three party encrypted key exchange scheme with explicit authentication (Q497145) (← links)
- Vulnerability of two multiple-key agreement protocols (Q553829) (← links)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol (Q621633) (← links)
- Multi-party authenticated key agreement protocols from multi-linear forms (Q702645) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (Q881859) (← links)
- Attacks of simple block ciphers via efficient heuristics (Q881887) (← links)
- An improved identity-based key agreement protocol and its security proof (Q1007846) (← links)
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card (Q1637907) (← links)
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (Q1761614) (← links)
- Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function (Q1763267) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Hybrid proxy multisignature: a new type multi-party signature (Q2465334) (← links)
- Three weaknesses in a simple three-party key exchange protocol (Q2465974) (← links)
- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings (Q2485651) (← links)
- Secure group key agreement protocol based on chaotic hash (Q2638204) (← links)
- Preventing Unknown Key-Share Attack using Cryptographic Bilinear Maps (Q2831820) (← links)
- (Q4436119) (← links)
- Cryptography and Coding (Q5428174) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712203) (← links)
- Information Security and Cryptology (Q5897824) (← links)