Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
From MaRDI portal
Publication:931089
DOI10.1016/J.INS.2008.02.008zbMATH Open1256.94073OpenAlexW1991925713MaRDI QIDQ931089FDOQ931089
Authors: Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi
Publication date: 25 June 2008
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2008.02.008
Recommendations
- Cryptanalysis of a simple three-party key exchange protocol
- Three weaknesses in a simple three-party key exchange protocol
- Simple three-party password authenticated key exchange protocol
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
cryptanalysisprovable securityattackspassword-authenticated key exchangethree-party protocolundetectable online dictionaryunknown key-share
Cites Work
- Title not available (Why is that?)
- Authenticated key exchange secure against dictionary attacks
- Topics in Cryptology – CT-RSA 2005
- Title not available (Why is that?)
- Three weaknesses in a simple three-party key exchange protocol
- Title not available (Why is that?)
- Efficient verifier-based key agreement protocol for three parties without server's public key
- Public Key Cryptography - PKC 2005
- Financial Cryptography and Data Security
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Errors in Computational Complexity Proofs for Protocols
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information and Communications Security
- Information and Communications Security
- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
- Computational Science and Its Applications – ICCSA 2004
- Applied Cryptography and Network Security
Cited In (17)
- Robust biometric-based three-party authenticated key establishment protocols
- Simple three-party password authenticated key exchange protocol
- Applied Cryptography and Network Security
- Provably secure three-party password-based authenticated key exchange protocol
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- Cryptanalysis of a simple three-party key exchange protocol
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Three weaknesses in a simple three-party key exchange protocol
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Simple password-based three-party authenticated key exchange without server public keys
- Cryptology and Network Security
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
This page was built for publication: Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q931089)