共 50 条
- [32] Cryptanalysis of a Simple Three-party Key Exchange Protocol INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (03): : 337 - 339
- [33] Weaknesses of a Verifier-based Password-authenticated Key Exchange Protocol in the Three-party Setting 2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 3 - 6
- [35] Password-based authenticated key exchange in the three-party setting PUBLIC KEY CRYPTOGRAPHY - PKC 2005, 2005, 3386 : 65 - 84
- [36] THREE-PARTY PASSWORD-AUTHENTICATED KEY EXCHANGE WITHOUT RANDOM ORACLES SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 15 - 24
- [38] Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 3133 - 3142
- [39] A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps Nonlinear Dynamics, 2013, 73 : 125 - 132
- [40] An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (04): : 25 - 32