DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Encrypted key exchange
Encrypted key exchange
The Twin Diffie-Hellman Problem and Applications
2.4 the Random Oracle Model
Multi-Server Authentication Key Exchange Approach in Bigdata Environment
Authentication and Key Distribution in Computer Networks and Distributed Systems
Strong Password-Based Authentication in TLS Using the Three-Party Group Diffie–Hellman Protocol
Fast and Secure Generating and Exchanging a Symmetric Key for TVWS Protocol
Distribution Scheme for Fog Networks Nikkhah Bahrami, P, Javadi, HHS, Dargahi, T, Dehghantanha, a and Choo, KKR
On Robust Key Agreement Based on Public Key Authentication Feng Hao Thales E-Security, Cambridge, UK
[email protected]
Analysing and Patching SPEKE in ISO/IEC
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols
Key Management in Ad-Hoc Networks
Location-Enhanced Authenticated Key Exchange
Anonymity and One-Way Authentication in Key Exchange Protocols
Strong Password-Only Authenticated Key Exchange *
J-PAKE: Authenticated Key Exchange Without
Two-Factor Password-Authenticated Key Exchange with End-To-End Security
Password-Based Simsec Protocol
Anonymity and One-Way Authentication in Key Exchange Protocols
Top View
Faster and Shorter Password-Authenticated Key Exchange
Security Proofs for an Efficient Password-Based Key Exchange
A Method for Making Password-Based Key Exchange Resilient to Server Compromise?
Authenticated Key Exchange Protocols, SRP-6A and PAKE2+
Distributed Public-Key Cryptography from Weak Secrets
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange
One-Time Verifier-Based Encrypted Key Exchange
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
On Password-Based Authenticated Key Exchange (Pake) Protocols
Password Authenticated Key Exchange by Juggling
Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Cryptanalysis of the Dragonfly Key Exchange Protocol
A Standards for Authentication and Key Establishment
Anonymity and One-Way Authentication in Key Exchange Protocols
CA-KEP : a Secure CA Based 2-Party Key Exchange Protocol
Efficient and Secure Authenticated Key Exchange Using Weak
Efficient Password Authenticated Key Exchange Based On
Password-Authenticated Key Exchange Based on RSA
One-Time Verifier-Based Encrypted Key Exchange
Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
Yet Another Attempt in User Authentication
Password Authenticated Key Exchange by Juggling a Key Exchange Protocol Without PKI
SPEKE-Revisited
UNIT-I Q.1 Explain Differential and Linear Cryptanalysis of DES
The SPEKE Protocol Revisited
Cryptography and Security
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Simple Password-Based Encrypted Key Exchange Protocols
A Study on Asymmetric Key Exchange Authentication Protocols Dr
Authenticated Key Exchange Secure Against Dictionary Attacks
Cache Attacks on CTR DRBG
Password-Authentication and Group Diffie-Hellman Key
Standards for Authentication and Key Establishment