CMQV+
From MaRDI portal
Software:18534
No author found.
Related Items (37)
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach ⋮ A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing ⋮ Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card ⋮ Provably secure extended chaotic map-based three-party key agreement protocols using password authentication ⋮ GPUs and chaos: a new true random number generator ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Verifier-based anonymous password-authenticated key exchange protocol in the standard model ⋮ Security weakness in a three-party pairing-based protocol for password authenticated key exchange ⋮ On the leakage-resilient key exchange ⋮ Provably secure three-party password-based authenticated key exchange protocol ⋮ Zero-knowledge identification scheme based on Weil pairing ⋮ On weaknesses of the HDCP authentication and key exchange protocol and its repair ⋮ Chaotic maps-based three-party password-authenticated key agreement scheme ⋮ Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys ⋮ Authenticated Group Key Agreement Protocol Without Pairing ⋮ Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card ⋮ A new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing ⋮ Provably secure three party encrypted key exchange scheme with explicit authentication ⋮ A rational framework for secure communication ⋮ Quantum identity authentication scheme of vehicular ad-hoc networks ⋮ Three weaknesses in a simple three-party key exchange protocol ⋮ Efficient password authenticated Key agreement using bilinear pairings ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol ⋮ Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol ⋮ ESAP: efficient and secure authentication protocol for roaming user in mobile communication networks ⋮ A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps ⋮ Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols ⋮ Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol ⋮ Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security ⋮ Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table ⋮ Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments ⋮ Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) ⋮ Provably secure three-party password-based authenticated key exchange protocol using Weil pairing ⋮ An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps ⋮ Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
This page was built for software: CMQV+