Weakness in a RSA-based password authenticated key exchange protocol
From MaRDI portal
Publication:975486
DOI10.1016/J.IPL.2008.06.002zbMath1191.68291OpenAlexW2055319984WikidataQ114666861 ScholiaQ114666861MaRDI QIDQ975486
Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jong In Lim
Publication date: 9 June 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2008.06.002
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
- Security Analysis of a Password Authenticated Key Exchange Protocol
- Efficient Password-Authenticated Key Exchange Based on RSA
- Progress in Cryptology - INDOCRYPT 2003
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Information Security
This page was built for publication: Weakness in a RSA-based password authenticated key exchange protocol