Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
From MaRDI portal
(Redirected from Publication:867668)
Recommendations
Cites work
- scientific article; zbMATH DE number 1643939 (Why is no real title available?)
- scientific article; zbMATH DE number 1304129 (Why is no real title available?)
- scientific article; zbMATH DE number 1341873 (Why is no real title available?)
- scientific article; zbMATH DE number 1980954 (Why is no real title available?)
- scientific article; zbMATH DE number 1996402 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1406789 (Why is no real title available?)
- An efficient protocol for authenticated key agreement
- Cryptography and Coding
- Multi-party authenticated key agreement protocols from multi-linear forms
- New directions in cryptography
- Reducing elliptic curve logarithms to logarithms in a finite field
Cited in
(28)- Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
- Secure group key agreement protocol based on chaotic hash
- MULTIPARTY KEY AGREEMENT PROTOCOL BASED ON SYMMETRIC TECHNIQUES
- Multi-party authenticated key agreement protocols from multi-linear forms
- Information Security
- Vulnerability of two multiple-key agreement protocols
- Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
- A round-optimal three-party ID-based authenticated key agreement protocol
- Hybrid proxy multisignature: a new type multi-party signature
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- An improved identity-based key agreement protocol and its security proof
- scientific article; zbMATH DE number 2042244 (Why is no real title available?)
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function
- Attacks of simple block ciphers via efficient heuristics
- Preventing unknown key-share attack using cryptographic bilinear maps
- scientific article; zbMATH DE number 2006822 (Why is no real title available?)
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Three weaknesses in a simple three-party key exchange protocol
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Progress in Cryptology - INDOCRYPT 2004
- scientific article; zbMATH DE number 1759313 (Why is no real title available?)
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Cryptography and Coding
- Pairwise key agreement protocols based on the Weil pairing
- Information Security and Cryptology
This page was built for publication: Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q867668)