Cryptanalysis of an efficient three-party password-based key exchange scheme
暂无分享,去创建一个
[1] Chun-Li Lin,et al. Enhanced three-party encrypted key exchange without server public keys , 2004, Comput. Secur..
[2] Hyun-Kyu Kang,et al. An off-line dictionary attack on a simple three-party key exchange protocol , 2009, IEEE Commun. Lett..
[3] Zhoujun Li,et al. Cryptanalysis of simple three-party key exchange protocol , 2008, Comput. Secur..
[4] Xiuying Zhao,et al. Cryptanalysis of a Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography , 2009, 2009 International Conference on Research Challenges in Computer Science.
[5] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Eun-Jun Yoon,et al. Cryptanalysis of a simple three-party password-based key exchange protocol , 2011, Int. J. Commun. Syst..
[7] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[8] Alfred Menezes,et al. Key Agreement Protocols and Their Security Analysis , 1997, IMACC.
[9] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[10] Wei-Pang Yang,et al. A communication-efficient three-party password authenticated key exchange protocol , 2011, Inf. Sci..
[11] Raphael C.-W. Phan,et al. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) , 2008, Inf. Sci..
[12] David Pointcheval,et al. Simple Password-Based Encrypted Key Exchange Protocols , 2005, CT-RSA.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[15] Kazuki Yoneyama. Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) , 2008, INDOCRYPT.
[16] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[17] Wei-Chi Ku,et al. Three weaknesses in a simple three-party key exchange protocol , 2008, Inf. Sci..
[18] Chin-Chen Chang,et al. An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments , 2009, J. Syst. Softw..
[19] Zhenfu Cao,et al. Simple three-party key exchange protocol , 2007, Comput. Secur..
[20] Der-Chyuan Lou,et al. Efficient three-party password-based key exchange scheme , 2011, Int. J. Commun. Syst..
[21] N. Koblitz. Elliptic curve cryptosystems , 1987 .