Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Authenticated Key Exchange

Authenticated Key Exchange (AKE) (or Authenticated Key Agreement) is the exchange of session key in a key exchange protocol which also authenticate… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of understanding well the guarantees and limitations… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2004
Highly Cited
2004
Password-based authenticated key exchange (PAKE) consists of protocols which are designed to be secure even when the secret key… Expand
  • figure 2
Highly Cited
2003
Highly Cited
2003
In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference… Expand
Highly Cited
2001
Highly Cited
2001
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared… Expand
Highly Cited
2001
Highly Cited
2001
There has been much interest in password-authenticated key-exchange protocols which remain secure even when users choose… Expand
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2000
Highly Cited
2000
When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using… Expand
  • figure 1
  • figure 2
Highly Cited
2000
Highly Cited
2000
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1996
Highly Cited
1996
A new simple password exponential key exchange method (SPEKE) is described. It belongs to an exclusive class of methods which… Expand
  • table 4
  • figure 4.3
  • table 4.6
Highly Cited
1993
Highly Cited
1993
We provide the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
1992
Highly Cited
1992
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric… Expand