The following pages link to (Q3374905):
Displayed 36 items.
- Security analysis of a password-based authentication protocol proposed to IEEE 1363 (Q818140) (← links)
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks (Q861696) (← links)
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange (Q865906) (← links)
- Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) (Q931089) (← links)
- Two-factor mutual authentication based on smart cards and passwords (Q955348) (← links)
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (Q1008987) (← links)
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement (Q2384520) (← links)
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks (Q2456502) (← links)
- Three weaknesses in a simple three-party key exchange protocol (Q2465974) (← links)
- Simpler session-key generation from short random passwords (Q2482336) (← links)
- Authenticating ad hoc networks by comparison of short digests (Q2482445) (← links)
- Simple authenticated key agreement and protected password change protocol (Q2485500) (← links)
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model (Q2502168) (← links)
- Provably secure threshold password-authenticated key exchange (Q2507695) (← links)
- Off-line password-guessing attacks on the generalized key agreement and password authentication protocol (Q2572355) (← links)
- Security Analysis of the PACE Key-Agreement Protocol (Q3399198) (← links)
- Practical encrypted key agreement using passwords (Q3443240) (← links)
- Password-based group key agreement protocol for client-server application (Q3443266) (← links)
- Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication (Q3503879) (← links)
- Traceable Privacy of Recent Provably-Secure RFID Protocols (Q3506416) (← links)
- Password Mistyping in Two-Factor-Authenticated Key Exchange (Q3519545) (← links)
- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort (Q3540059) (← links)
- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting (Q3600323) (← links)
- A Modular Security Analysis of the TLS Handshake Protocol (Q3600365) (← links)
- Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups (Q3603005) (← links)
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 (Q3623036) (← links)
- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps (Q3637143) (← links)
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness (Q3637144) (← links)
- A New Client-to-Client Password-Authenticated Key Agreement Protocol (Q5322999) (← links)
- SAS-Based Group Authentication and Key Agreement Protocols (Q5445454) (← links)
- Faster and Shorter Password-Authenticated Key Exchange (Q5445527) (← links)
- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues (Q5458218) (← links)
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework (Q5458950) (← links)
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) (Q5504621) (← links)
- New Anonymity Notions for Identity-Based Encryption (Q5900461) (← links)
- New Anonymity Notions for Identity-Based Encryption (Q5902046) (← links)