共 50 条
- [42] An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (03): : 5337 - 5353
- [43] Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3244 - 3260
- [45] Provably leakage-resilient three-party password-based authenticated key exchange Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 163 - 173
- [46] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
- [47] Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 231 - 237
- [48] Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (01): : 57 - 63
- [49] Simple three-party password-based key exchange protocol with provable security 1600, Acta Press (35):
- [50] How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 218 - +