Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
From MaRDI portal
Publication:867668
DOI10.1016/j.ins.2006.07.034zbMath1130.94329OpenAlexW1990227598MaRDI QIDQ867668
Publication date: 16 February 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2006.07.034
Related Items
Secure group key agreement protocol based on chaotic hash ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ Efficient elliptic curve scalar multiplication algorithms resistant to power analysis ⋮ Attacks of simple block ciphers via efficient heuristics ⋮ A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol ⋮ A round-optimal three-party ID-based authenticated key agreement protocol ⋮ A novel elliptic curve scalar multiplication algorithm against power analysis ⋮ Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks ⋮ Provably secure three party encrypted key exchange scheme with explicit authentication ⋮ Hybrid proxy multisignature: a new type multi-party signature ⋮ Three weaknesses in a simple three-party key exchange protocol ⋮ An improved identity-based key agreement protocol and its security proof
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Multi-party authenticated key agreement protocols from multi-linear forms
- An efficient protocol for authenticated key agreement
- New directions in cryptography
- Reducing elliptic curve logarithms to logarithms in a finite field
- Cryptography and Coding
This page was built for publication: Cryptanalysis of tripartite and multi-party authenticated key agreement protocols