[go: up one dir, main page]

Liang et al., 2013 - Google Patents

Re-attack on a three-party password-based authenticated key exchange protocol

Liang et al., 2013

View HTML
Document ID
18215244738410281678
Author
Liang H
Hu J
Wu S
Publication year
Publication venue
Mathematical and Computer Modelling

External Links

Snippet

A password based authenticated key exchange protocol is of practical usefulness in the protection of sharing of urban rail train sensor monitoring data. However, many password- based protocols in the literature were not secure. Recently, Huang presented a simple and …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Similar Documents

Publication Publication Date Title
US11722305B2 (en) Password based threshold token generation
Agrawal et al. PASTA: password-based threshold authentication
Zeng et al. E-AUA: An efficient anonymous user authentication protocol for mobile IoT
Chatterjee et al. An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks
EP1134929B1 (en) Secure mutual network authentication and key exchange protocol
US8132006B2 (en) Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE)
Chung et al. Three weaknesses in a simple three-party key exchange protocol
Tseng et al. A pairing-based user authentication scheme for wireless clients with smart cards
Kim et al. Enhanced password-based simple three-party key exchange protocol
Katz et al. Two-server password-only authenticated key exchange
Xiong et al. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
Wu et al. Enhancements of a three-party password-based authenticated key exchange protocol.
Yi et al. ID-based two-server password-authenticated key exchange
Wu et al. Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme
Tso Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
Pu et al. Secure verifier-based three-party password-authenticated key exchange
Lo et al. Cryptanalysis of two three-party encrypted key exchange protocols
Liu et al. ECC-based password-authenticated key exchange in the three-party setting
Shin et al. Leakage-resilient authenticated key establishment protocols
Liang et al. Re-attack on a three-party password-based authenticated key exchange protocol
Phan et al. Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
Wu et al. Improved two-factor authenticated key exchange protocol.
Tsai et al. Provably secure three party encrypted key exchange scheme with explicit authentication
Shin et al. A simple leakage-resilient authenticated key establishment protocol, its extensions, and applications
Pu et al. Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks.