Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374907

zbMath1082.94535MaRDI QIDQ3374907

Sarvar Patel, Victor Boyko, Philip D. MacKenzie

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Security analysis of a password-based authentication protocol proposed to IEEE 1363Unnamed ItemEfficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key ConsensusPassword-based group key agreement protocol for client-server applicationSmooth NIZK argumentsEC2C-PAKA: an efficient client-to-client password-authenticated key agreementProvably secure extended chaotic map-based three-party key agreement protocols using password authenticationModular approach to the design and analysis of password-based security protocolsSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeA New Client-to-Client Password-Authenticated Key Agreement ProtocolAsymmetric PAKE with low computation \textit{and} communicationRound-optimal password-based authenticated key exchangeWireless-channel key exchangeA universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)Simple and efficient password-based authenticated key exchange protocolTwo-server password-only authenticated key exchangeCHIP and CRISP: protecting all parties against compromise through identity-binding PAKEsAuditable asymmetric password authenticated public key establishmentFuzzy asymmetric password-authenticated key exchangePassword Mistyping in Two-Factor-Authenticated Key ExchangeProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldInjective encodings to binary ordinary elliptic curvesHow not to create an isogeny-based PAKEHashing into Hessian CurvesComposition of password-based protocolsSimpler session-key generation from short random passwordsCryptanalysis of a communication-efficient three-party password authenticated key exchange protocolA fuzzy vault schemeProvably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingModular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk modelFaster and Shorter Password-Authenticated Key ExchangeProvably secure threshold password-authenticated key exchangeEfficient Two-Party Password-Based Key Exchange Protocols in the UC FrameworkPassword-authenticated group key establishment from smooth projective hash functionsPassword-Authenticated Group Key Agreement with Adaptive Security and ContributivenessUniform encodings to elliptic curves and indistinguishable point representationEfficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Off-line password-guessing attacks on the generalized key agreement and password authentication protocolUniversally composable relaxed password authenticated key exchangeProvably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model