EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
Most password-authenticated key agreement schemes described in the literature have
focused on authenticated key agreement using a shared password between a client and a …
focused on authenticated key agreement using a shared password between a client and a …
Cross-domain password-based authenticated key exchange revisited
We revisit the problem of secure cross-domain communication between two users belonging
to different security domains within an open and distributed environment. Existing …
to different security domains within an open and distributed environment. Existing …
[PDF][PDF] Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New Architecture in Standard Model.
H Zhu, Y Zhang, Y **a, H Li - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Nowadays, the overwhelming majority of passwordauthenticated key agreement protocols
using chaotic maps are based on three architectures (client/server, two clients/server and …
using chaotic maps are based on three architectures (client/server, two clients/server and …
A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks
Password‐authenticated group key exchange protocols enable communication parties to
establish a common secret key (a session key) by only using short secret passwords. Such …
establish a common secret key (a session key) by only using short secret passwords. Such …
Efficient provably secure password-based explicit authenticated key agreement
A password-based authenticated key agreement enables several parties to establish a
shared cryptographically strong key over a public unreliable and insecure network using …
shared cryptographically strong key over a public unreliable and insecure network using …
[PDF][PDF] A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm.
H Zhu, Y Zhang, Y Zhang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Until now, the overwhelming majority of passwordauthenticated key agreement protocols
using chaotic maps are based on three architectures (client/server, two clients/server and …
using chaotic maps are based on three architectures (client/server, two clients/server and …
Secure cross-realm C2C-PAKE protocol
Y Yin, L Bao - Australasian Conference on Information Security and …, 2006 - Springer
Client-to-client password authenticated key exchange (C2C-PAKE) protocol deals with the
authenticated key exchange process between two clients, who only share their passwords …
authenticated key exchange process between two clients, who only share their passwords …
A new client-to-client password-authenticated key agreement protocol
DG Feng, J Xu - … and Cryptology: Second International Workshop, IWCC …, 2009 - Springer
Client-to-client password-authenticated key agreement (C2C-PAKA) protocol deals with the
authenticated key agreement process between two clients of different realms, who only …
authenticated key agreement process between two clients of different realms, who only …
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow parties to share
secret keys in an authentic manner based on an easily memorizable password. Byun et al …
secret keys in an authentic manner based on an easily memorizable password. Byun et al …