Weakness in a RSA-based password authenticated key exchange protocol
From MaRDI portal
Recommendations
- Applied Cryptography and Network Security
- Publication:4945378
- Security weaknesses of authenticated key agreement protocols
- Security weakness in a three-party pairing-based protocol for password authenticated key exchange
- Efficient and secure authenticated key exchange using weak passwords
- scientific article; zbMATH DE number 2226956
- Information Security and Privacy
- Security Analysis of a Password Authenticated Key Exchange Protocol
Cites work
- scientific article; zbMATH DE number 1583809 (Why is no real title available?)
- scientific article; zbMATH DE number 1941235 (Why is no real title available?)
- Authenticated key exchange secure against dictionary attacks
- Efficient Password-Authenticated Key Exchange Based on RSA
- Information Security
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Progress in Cryptology - INDOCRYPT 2003
- Security Analysis of a Password Authenticated Key Exchange Protocol
- Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
Cited in
(10)- scientific article; zbMATH DE number 1941235 (Why is no real title available?)
- scientific article; zbMATH DE number 1424181 (Why is no real title available?)
- Information Security
- On password-based authenticated key exchange using collisionful hash functions
- Computational Science and Its Applications – ICCSA 2004
- On the weak keys of blowfish
- Applied Cryptography and Network Security
- Vulnerabilities of one cryptographic protocol
- Password Mistyping in Two-Factor-Authenticated Key Exchange
- scientific article; zbMATH DE number 1583809 (Why is no real title available?)
This page was built for publication: Weakness in a RSA-based password authenticated key exchange protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q975486)