scientific article
From MaRDI portal
Publication:3374907
zbMath1082.94535MaRDI QIDQ3374907
Sarvar Patel, Victor Boyko, Philip D. MacKenzie
Publication date: 1 March 2006
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Security analysis of a password-based authentication protocol proposed to IEEE 1363 ⋮ Unnamed Item ⋮ Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus ⋮ Password-based group key agreement protocol for client-server application ⋮ Smooth NIZK arguments ⋮ EC2C-PAKA: an efficient client-to-client password-authenticated key agreement ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ Modular approach to the design and analysis of password-based security protocols ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ A New Client-to-Client Password-Authenticated Key Agreement Protocol ⋮ Asymmetric PAKE with low computation \textit{and} communication ⋮ Round-optimal password-based authenticated key exchange ⋮ Wireless-channel key exchange ⋮ A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure) ⋮ Simple and efficient password-based authenticated key exchange protocol ⋮ Two-server password-only authenticated key exchange ⋮ CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs ⋮ Auditable asymmetric password authenticated public key establishment ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Password Mistyping in Two-Factor-Authenticated Key Exchange ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Injective encodings to binary ordinary elliptic curves ⋮ How not to create an isogeny-based PAKE ⋮ Hashing into Hessian Curves ⋮ Composition of password-based protocols ⋮ Simpler session-key generation from short random passwords ⋮ Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol ⋮ A fuzzy vault scheme ⋮ Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting ⋮ Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model ⋮ Faster and Shorter Password-Authenticated Key Exchange ⋮ Provably secure threshold password-authenticated key exchange ⋮ Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework ⋮ Password-authenticated group key establishment from smooth projective hash functions ⋮ Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness ⋮ Uniform encodings to elliptic curves and indistinguishable point representation ⋮ Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) ⋮ Off-line password-guessing attacks on the generalized key agreement and password authentication protocol ⋮ Universally composable relaxed password authenticated key exchange ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model