Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
From MaRDI portal
(Redirected from Publication:931089)
Recommendations
- Cryptanalysis of a simple three-party key exchange protocol
- Three weaknesses in a simple three-party key exchange protocol
- Simple three-party password authenticated key exchange protocol
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
Cites work
- scientific article; zbMATH DE number 1263181 (Why is no real title available?)
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1980955 (Why is no real title available?)
- scientific article; zbMATH DE number 2009973 (Why is no real title available?)
- scientific article; zbMATH DE number 2009978 (Why is no real title available?)
- Applied Cryptography and Network Security
- Authenticated key exchange secure against dictionary attacks
- Computational Science and Its Applications – ICCSA 2004
- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
- Efficient verifier-based key agreement protocol for three parties without server's public key
- Errors in Computational Complexity Proofs for Protocols
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Financial Cryptography and Data Security
- Information and Communications Security
- Information and Communications Security
- Public Key Cryptography - PKC 2005
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Three weaknesses in a simple three-party key exchange protocol
- Topics in Cryptology – CT-RSA 2005
Cited in
(17)- Robust biometric-based three-party authenticated key establishment protocols
- Simple three-party password authenticated key exchange protocol
- Provably secure three-party password-based authenticated key exchange protocol
- Applied Cryptography and Network Security
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- Cryptanalysis of a simple three-party key exchange protocol
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- On security analysis of an after-the-fact leakage resilient key exchange protocol
- Tight security analysis of 3-round key-alternating cipher with a single permutation
- A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
- Three weaknesses in a simple three-party key exchange protocol
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- Simple password-based three-party authenticated key exchange without server public keys
- Cryptology and Network Security
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol
This page was built for publication: Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q931089)