Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Public Key Cryptography - PKC 2005 - MaRDI portal

Public Key Cryptography - PKC 2005

From MaRDI portal
Publication:5711587

DOI10.1007/b105124zbMath1081.94513OpenAlexW2506201965MaRDI QIDQ5711587

Michel Abdalla, David Pointcheval, Pierre-Alain Fouque

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b105124




Related Items

Practical encrypted key agreement using passwordsCryptanalysis and design of a three-party authenticated key exchange protocol using smart cardStand-by Attacks on E-ID Password AuthenticationEC2C-PAKA: an efficient client-to-client password-authenticated key agreementVerifier-based anonymous password-authenticated key exchange protocol in the standard modelSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeA New Client-to-Client Password-Authenticated Key Agreement ProtocolProvable secure and efficient digital rights management authentication scheme using smart card based on elliptic curve cryptographyWireless-channel key exchangePassword-authenticated key exchange from group actionsProvably secure three-party password-based authenticated key exchange protocolProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldCryptanalysis of simple three-party key exchange protocol (S-3PAKE)Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networksPreserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymityTwo-factor mutual authentication based on smart cards and passwordsfficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange ProtocolCryptanalysis of a communication-efficient three-party password authenticated key exchange protocolA Modular Security Analysis of EAP and IEEE 802.11Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA SettingConstant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic GroupsPitfalls in a server-aided authenticated group key establishmentRobust Pseudo-Random Number Generators with Input Secure Against Side-Channel AttacksContributory Password-Authenticated Group Key Exchange with Join CapabilityPassword-authenticated group key establishment from smooth projective hash functionsGateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger SecuritySecurity Analysis of the PACE Key-Agreement ProtocolNew Anonymity Notions for Identity-Based EncryptionNew Anonymity Notions for Identity-Based EncryptionEfficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Universally composable relaxed password authenticated key exchangeTighter proofs for the SIGMA and TLS 1.3 key exchange protocols