| Publication | Date of Publication | Type |
|---|
Two-round password-only authenticated key exchange in the three-party setting Symmetry | 2017-09-27 | Paper |
Prevention of exponential equivalence in simple password exponential key exchange (SPEKE) Symmetry | 2017-09-27 | Paper |
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols Information Sciences | 2017-02-07 | Paper |
Security improvement on a group key exchange protocol for mobile networks Computational Science and Its Applications - ICCSA 2011 | 2011-06-30 | Paper |
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol Information Sciences | 2011-01-28 | Paper |
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs Computers and Electrical Engineering | 2010-04-07 | Paper |
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity Applied Cryptography and Network Security | 2009-03-10 | Paper |
Two Efficient and Secure Authentication Schemes Using Smart Cards Computational Science and Its Applications - ICCSA 2006 | 2009-02-12 | Paper |
An Inter-domain Key Agreement Protocol Using Weak Passwords Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Efficient Password-Authenticated Key Exchange Based on RSA Lecture Notes in Computer Science | 2008-04-17 | Paper |
Threshold Entrusted Undeniable Signature Lecture Notes in Computer Science | 2008-03-17 | Paper |
Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks Information Sciences | 2007-10-18 | Paper |
Security weakness in a three-party pairing-based protocol for password authenticated key exchange Information Sciences | 2007-02-20 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2005-12-23 | Paper |
Computational Science and Its Applications – ICCSA 2004 Lecture Notes in Computer Science | 2005-12-23 | Paper |
Computational Science – ICCS 2005 Lecture Notes in Computer Science | 2005-11-30 | Paper |
scientific article; zbMATH DE number 2048536 (Why is no real title available?) | 2004-03-01 | Paper |
scientific article; zbMATH DE number 2013390 (Why is no real title available?) | 2003-12-04 | Paper |
scientific article; zbMATH DE number 1759336 (Why is no real title available?) | 2003-01-25 | Paper |
scientific article; zbMATH DE number 1759645 (Why is no real title available?) | 2002-11-24 | Paper |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) Cryptography and Coding | 2002-11-12 | Paper |
On proposition and comparison of trace computation methods in finite field \(GF(2^m)\) Far East Journal of Mathematical Sciences | 2002-05-04 | Paper |
scientific article; zbMATH DE number 1689607 (Why is no real title available?) | 2002-01-13 | Paper |
scientific article; zbMATH DE number 1805963 (Why is no real title available?) | 2002-01-01 | Paper |
scientific article; zbMATH DE number 1304301 (Why is no real title available?) | 2000-02-15 | Paper |
scientific article; zbMATH DE number 1107690 (Why is no real title available?) | 1998-06-09 | Paper |
scientific article; zbMATH DE number 1107689 (Why is no real title available?) | 1998-05-03 | Paper |