Search

Your search keyword '"three-party key exchange"' showing total 21 results

Search Constraints

Start Over You searched for: Descriptor "three-party key exchange" Remove constraint Descriptor: "three-party key exchange"
21 results on '"three-party key exchange"'

Search Results

1. Post-quantum verifier-based three-party password authenticated key exchange protocol

2. 后量子基于验证元的三方口令认证密钥交换协议.

3. Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE

4. Password-based three-party authenticated key exchange protocol from lattices

6. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

7. 格上基于口令的三方认证密钥交换协议.

8. Cryptanalysis of an Efficient Three-Party Key Exchange Protocol.

9. Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.

10. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol.

11. An Id-Based Three-Party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile-Commerce Environments.

12. Efficient three-party password-based key exchange scheme.

13. A simple three-party password-based key exchange protocol.

14. An Improvement to Lee and Hwang's Scheme.

15. Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys.

16. Simple password-based three-party authenticated key exchange without server public keys

17. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

18. An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting

19. Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols

20. Cryptanalysis of Yang-Li-Liao's Simple Three-Party Key Exchange (S-3PAKE) Protocol

21. Two Undetectable On-Line Dictionary Attacks On Debiao Et Al.'S S-3Pake Protocol

Catalog

Books, media, physical & digital resources