scientific article; zbMATH DE number 5009198
From MaRDI portal
Publication:3374907
zbMATH Open1082.94535MaRDI QIDQ3374907FDOQ3374907
Philip MacKenzie, Sarvar Patel, Victor Boyko
Publication date: 1 March 2006
Title of this publication is not available (Why is that?)
Recommendations
- scientific article; zbMATH DE number 2009977
- Provably secure threshold password-authenticated key exchange
- A secure and efficient authenticated Diffie-Hellman protocol
- Efficient and secure authenticated key exchange using weak passwords
- Efficient password authenticated key exchange via oblivious transfer
- Information Security
- Provably secure password-authenticated group key exchange with different passwords under standard assumption
- Efficient and provably secure generic construction of client-to-client password-based key exchange protocol
- scientific article; zbMATH DE number 2009978
Cited In (64)
- Provably secure threshold password-authenticated key exchange
- Practical encrypted key agreement using passwords
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
- Off-line password-guessing attacks on the generalized key agreement and password authentication protocol
- A fuzzy vault scheme
- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
- Simple and efficient password-based authenticated key exchange protocol
- Title not available (Why is that?)
- Title not available (Why is that?)
- How not to create an isogeny-based PAKE
- Title not available (Why is that?)
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- Title not available (Why is that?)
- Smooth NIZK arguments
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- Simpler session-key generation from short random passwords
- A simple deniable authentication protocol based on the Diffie–Hellman algorithm
- Hashing into Hessian Curves
- Authenticated key exchange secure against dictionary attacks
- Provably Secure Scalable Distributed Authentication for Clouds
- Wireless-channel key exchange
- TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- Modular approach to the design and analysis of password-based security protocols
- Parallel Processing and Applied Mathematics
- Relatively-Sound NIZKs and Password-Based Key-Exchange
- Universally composable relaxed password authenticated key exchange
- Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus
- Direct proof of security of Wegman-Carter authentication with partially known key
- Asymmetric PAKE with low computation \textit{and} communication
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
- Title not available (Why is that?)
- Composition of password-based protocols
- Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model
- Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting
- A New Client-to-Client Password-Authenticated Key Agreement Protocol
- Fuzzy asymmetric password-authenticated key exchange
- Uniform encodings to elliptic curves and indistinguishable point representation
- Theory of Cryptography
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- Financial Cryptography and Data Security
- Password-authenticated group key establishment from smooth projective hash functions
- Password-based group key agreement protocol for client-server application
- Title not available (Why is that?)
- Round-optimal password-based authenticated key exchange
- Two-server password-only authenticated key exchange
- Faster and Shorter Password-Authenticated Key Exchange
- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
- Injective encodings to binary ordinary elliptic curves
- Security analysis of a password-based authentication protocol proposed to IEEE 1363
- Title not available (Why is that?)
- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
- Generalized fuzzy password-authenticated key exchange from error correcting codes
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs
- Auditable asymmetric password authenticated public key establishment
- A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)
- Password-authenticated TLS via OPAQUE and post-handshake authentication
- Post-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMIS
- Tightly-secure PAK(E)
- $$\text {Muckle}+$$: End-to-End Hybrid Authenticated Key Exchanges
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374907)