Authenticated Key Exchange

Authenticated Key Exchange (AKE) (or Authenticated Key Agreement) is the exchange of session key in a key exchange protocol which also authenticate… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Recent work by Krawczyk [12] and Menezes [16] has highlighted the importance of understanding well the guarantees and limitations… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Password-based authenticated key exchange (PAKE) are protocols which are designed to be secure even when the secret key used for… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Group Diffie-Hellman protocols for Authenticated Key Exchange (AKE) are designed to provide a pool of players with a shared… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A new simple password exponential key exchange method (SPEKE) is described. It belongs to an exclusive class of methods which… (More)
  • table 4
  • figure 4.3
  • table 4.6
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Entity authentication and key distribution are central cryptographic problems in distributed computing|but up until now, they… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1992
Highly Cited
1992
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric… (More)
Is this relevant?