Vulnerability of two multiple-key agreement protocols
From MaRDI portal
Recommendations
- Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
- Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function
- Improved authenticated multiple-key agreement protocol
- An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement Protocol
- Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Cited in
(7)- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?
- Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card
- Vulnerabilities of one cryptographic protocol
- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- Two attacks on Neuman-Stubblebine authentication protocols
This page was built for publication: Vulnerability of two multiple-key agreement protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q553829)