CMQV+

From MaRDI portal
Revision as of 20:07, 5 March 2024 by Import240305080343 (talk | contribs) (Created automatically from import240305080343)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Software:18534



swMATH6418MaRDI QIDQ18534


No author found.





Related Items (37)

Towards secure quantum key distribution protocol for wireless LANs: a hybrid approachA novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computingCryptanalysis and design of a three-party authenticated key exchange protocol using smart cardProvably secure extended chaotic map-based three-party key agreement protocols using password authenticationGPUs and chaos: a new true random number generatorRobust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacyVerifier-based anonymous password-authenticated key exchange protocol in the standard modelSecurity weakness in a three-party pairing-based protocol for password authenticated key exchangeOn the leakage-resilient key exchangeProvably secure three-party password-based authenticated key exchange protocolZero-knowledge identification scheme based on Weil pairingOn weaknesses of the HDCP authentication and key exchange protocol and its repairChaotic maps-based three-party password-authenticated key agreement schemeFinding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keysAuthenticated Group Key Agreement Protocol Without PairingImprovement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart cardA new three-party-authenticated key agreement scheme based on chaotic maps without password tableA Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud ComputingProvably secure three party encrypted key exchange scheme with explicit authenticationA rational framework for secure communicationQuantum identity authentication scheme of vehicular ad-hoc networksThree weaknesses in a simple three-party key exchange protocolEfficient password authenticated Key agreement using bilinear pairingsDesign and analysis of a three party password-based authenticated key exchange protocol using extended chaotic mapsfficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange ProtocolCryptanalysis of a communication-efficient three-party password authenticated key exchange protocolESAP: efficient and secure authentication protocol for roaming user in mobile communication networksA novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic mapsEfficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange ProtocolsDesign and analysis of a chaotic maps-based three-party authenticated key agreement protocolGateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger SecurityImprovement in new three-party-authenticated key agreement scheme based on chaotic maps without password tableEphemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environmentsEfficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)Provably secure three-party password-based authenticated key exchange protocol using Weil pairingAn efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic mapsProvably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model


This page was built for software: CMQV+