Design of mutually authenticated key agreement protocol resistant to impersonation attacks for multi-server environment
Three-factor mutually authenticated key agreement protocols for multi-server environments
have gained momentum in recent times due to advancements in wireless technologies and …
have gained momentum in recent times due to advancements in wireless technologies and …
[HTML][HTML] An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
In the literature, many three-party authenticated key exchange (3PAKE) protocols are put
forwarded to established a secure session key between two users with the help of trusted …
forwarded to established a secure session key between two users with the help of trusted …
Extended 3PAKE authentication scheme for value-added services in VANETs
An authentication scheme is inevitable for providing secured communication in high-speed
networks like Vehicular Ad-hoc Networks (VANETs), where node speed varies between 10 …
networks like Vehicular Ad-hoc Networks (VANETs), where node speed varies between 10 …
An efficient biometric‐based privacy‐preserving three‐party authentication with key agreement protocol using smart cards
In communication systems, authentication protocols play an important role in protecting
sensitive information against a malicious adversary by means of providing a variety of …
sensitive information against a malicious adversary by means of providing a variety of …
An efficient client–client password-based authentication scheme with provable security
Recently, Tso proposed a three-party password-based authenticated key exchange
(3PAKE) protocol. This protocol allows two clients to authenticate each other and establish a …
(3PAKE) protocol. This protocol allows two clients to authenticate each other and establish a …
Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
L Yang, Z Zheng - Plos One, 2018 - journals.plos.org
According to advancements in the wireless technologies, study of biometrics-based multi-
server authenticated key agreement schemes has acquired a lot of momentum. Recently …
server authenticated key agreement schemes has acquired a lot of momentum. Recently …
An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems
The telecare medicine information systems (TMIS) offer a networking channel across public
networks to access remote medical services and enable health care professionals and …
networks to access remote medical services and enable health care professionals and …
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
We revisit the communication-efficient three-party password authenticated key exchange
protocol recently proposed by Chang et al. We show it is insecure against partition attacks …
protocol recently proposed by Chang et al. We show it is insecure against partition attacks …
An enhanced and secure three-party password-based authenticated key exchange protocol without using server's public-keys and symmetric cryptosystems
Password-based authenticated key exchange protocol is a type of authenticated key
exchange protocols which enables two or more communication entities, who only share …
exchange protocols which enables two or more communication entities, who only share …
Finding and fixing vulnerabilities in several three-party password authenticated key exchange protocols without server public keys
H Xiong, Y Chen, Z Guan, Z Chen - Information Sciences, 2013 - Elsevier
Three-party password-based authenticated key exchange (3PAKE) protocols allow two
users (clients) to establish a session key with the support from an authenticated server over …
users (clients) to establish a session key with the support from an authenticated server over …