Liang et al., 2013 - Google Patents
Re-attack on a three-party password-based authenticated key exchange protocolLiang et al., 2013
View HTML- Document ID
- 18215244738410281678
- Author
- Liang H
- Hu J
- Wu S
- Publication year
- Publication venue
- Mathematical and Computer Modelling
External Links
Snippet
A password based authenticated key exchange protocol is of practical usefulness in the protection of sharing of urban rail train sensor monitoring data. However, many password- based protocols in the literature were not secure. Recently, Huang presented a simple and …
- 238000005192 partition 0 abstract description 14
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11722305B2 (en) | Password based threshold token generation | |
Agrawal et al. | PASTA: password-based threshold authentication | |
Zeng et al. | E-AUA: An efficient anonymous user authentication protocol for mobile IoT | |
Chatterjee et al. | An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks | |
EP1134929B1 (en) | Secure mutual network authentication and key exchange protocol | |
US8132006B2 (en) | Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) | |
Chung et al. | Three weaknesses in a simple three-party key exchange protocol | |
Tseng et al. | A pairing-based user authentication scheme for wireless clients with smart cards | |
Kim et al. | Enhanced password-based simple three-party key exchange protocol | |
Katz et al. | Two-server password-only authenticated key exchange | |
Xiong et al. | Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys | |
Wu et al. | Enhancements of a three-party password-based authenticated key exchange protocol. | |
Yi et al. | ID-based two-server password-authenticated key exchange | |
Wu et al. | Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme | |
Tso | Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol | |
Pu et al. | Secure verifier-based three-party password-authenticated key exchange | |
Lo et al. | Cryptanalysis of two three-party encrypted key exchange protocols | |
Liu et al. | ECC-based password-authenticated key exchange in the three-party setting | |
Shin et al. | Leakage-resilient authenticated key establishment protocols | |
Liang et al. | Re-attack on a three-party password-based authenticated key exchange protocol | |
Phan et al. | Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords | |
Wu et al. | Improved two-factor authenticated key exchange protocol. | |
Tsai et al. | Provably secure three party encrypted key exchange scheme with explicit authentication | |
Shin et al. | A simple leakage-resilient authenticated key establishment protocol, its extensions, and applications | |
Pu et al. | Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks. |