Password-authenticated key agreement

Known as: PAKE 
In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Password authentication protocols have been broadly deployed in client/server communication settings for its convenient usage and… (More)
  • figure 1
  • table I
Is this relevant?
Highly Cited
2010
Highly Cited
2010
By exploiting a smart card, this paper presents a robust and efficient password-authenticated key agreement scheme. This paper… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table II
Is this relevant?
2009
2009
Client-to-client password-authenticated key agreement (C2CPAKA) protocol deals with the authenticated key agreement process… (More)
  • table 1
  • figure 1
  • figure 3
Is this relevant?
2009
2009
A password-authenticated key agreement scheme based on Elliptic Curves Cryptography (ECC) for Ad hoc networks is presented. The… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
Highly Cited
2008
Highly Cited
2008
User authentication and key agreement is an important security primitive for creating a securely distributed information system… (More)
  • table I
  • table II
  • table III
Is this relevant?
2007
2007
Most password-authenticated key agreement schemes described in the literature have focused on authenticated key agreement using a… (More)
  • table 1
  • figure 1
  • figure 2
Is this relevant?
2007
2007
In this paper we point out potential weaknesses of AuthA protocols which are in the process of being standardized by IEEE; IEEE… (More)
Is this relevant?
2006
2006
Key agreement protocols constitute one of the most valuable cryptographic primitives since they allow two (or more) users to… (More)
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The smart-card based remote user authentication and key agreement scheme is a very practical solution to create a secure… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
When designing password-authenticated key exchange protocols (as opposed to key exchange protocols authenticated using… (More)
  • figure 1
  • figure 2
Is this relevant?