CMQV+
From MaRDI portal
Software:18534
swMATH6418MaRDI QIDQ18534FDOQ18534
Author name not available (Why is that?)
Cited In (37)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
- Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments
- Quantum identity authentication scheme of vehicular ad-hoc networks
- fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol
- Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol
- Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security
- Provably secure three-party password-based authenticated key exchange protocol
- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
- A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- On weaknesses of the HDCP authentication and key exchange protocol and its repair
- Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
- Provably secure extended chaotic map-based three-party key agreement protocols using password authentication
- Verifier-based anonymous password-authenticated key exchange protocol in the standard model
- ESAP: efficient and secure authentication protocol for roaming user in mobile communication networks
- GPUs and chaos: a new true random number generator
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- Three weaknesses in a simple three-party key exchange protocol
- A new three-party-authenticated key agreement scheme based on chaotic maps without password table
- Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
- Zero-knowledge identification scheme based on Weil pairing
- On the leakage-resilient key exchange
- Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card
- Authenticated Group Key Agreement Protocol Without Pairing
- Provably secure three party encrypted key exchange scheme with explicit authentication
- Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
- A rational framework for secure communication
- A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing
- Efficient password authenticated Key agreement using bilinear pairings
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Chaotic maps-based three-party password-authenticated key agreement scheme
This page was built for software: CMQV+