Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
From MaRDI portal
Publication:867668
DOI10.1016/J.INS.2006.07.034zbMATH Open1130.94329OpenAlexW1990227598MaRDI QIDQ867668FDOQ867668
Authors: Kyung-Ah Shim, Sung Sik Woo
Publication date: 16 February 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2006.07.034
Recommendations
Cites Work
- New directions in cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Reducing elliptic curve logarithms to logarithms in a finite field
- Title not available (Why is that?)
- An efficient protocol for authenticated key agreement
- Title not available (Why is that?)
- Cryptography and Coding
- Title not available (Why is that?)
- Multi-party authenticated key agreement protocols from multi-linear forms
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (28)
- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
- Secure group key agreement protocol based on chaotic hash
- MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES
- Information Security
- Multi-party authenticated key agreement protocols from multi-linear forms
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- Vulnerability of two multiple-key agreement protocols
- A round-optimal three-party ID-based authenticated key agreement protocol
- Hybrid proxy multisignature: a new type multi-party signature
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- Title not available (Why is that?)
- An improved identity-based key agreement protocol and its security proof
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function
- Attacks of simple block ciphers via efficient heuristics
- Preventing unknown key-share attack using cryptographic bilinear maps
- Title not available (Why is that?)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Three weaknesses in a simple three-party key exchange protocol
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Progress in Cryptology - INDOCRYPT 2004
- Title not available (Why is that?)
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Cryptography and Coding
- Pairwise key agreement protocols based on the Weil pairing
- Information Security and Cryptology
This page was built for publication: Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q867668)