Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Password-authenticated key agreement

Known as: PAKE 
In cryptography, a password-authenticated key agreement method is an interactive method for two or more parties to establish cryptographic keys based… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This paper initiates the study of two specific security threats on smart-card-based password authentication in distributed… Expand
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Abstract Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Since chaos theory related to cryptography has been addressed widely, many chaotic maps based two-party password-authenticated… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
This paper aims at providing a key agreement protocol for smart grid to cope with access control of appliances/devices located… Expand
  • figure 2
  • figure 1
  • table I
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
By exploiting a smart card, this paper presents a robust and efficient password-authenticated key agreement scheme. This paper… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • table II
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In the IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, vol. 55, no. 6, Juang et al.proposed a password-authenticated key agreement… Expand
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
2009
2009
Client-to-client password-authenticated key agreement (C2C-PAKA) protocol deals with the authenticated key agreement process… Expand
  • table 1
  • figure 1
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
User authentication and key agreement is an important security primitive for creating a securely distributed information system… Expand
  • table I
  • table II
  • table III
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Most password-authenticated key agreement schemes described in the literature have focused on authenticated key agreement using a… Expand
  • table 1
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
  • W. Juang
  • Comput. Secur.
  • 2004
  • Corpus ID: 11579889
The smart-card based remote user authentication and key agreement scheme is a very practical solution to create a secure… Expand
  • table 1
  • table 2
Is this relevant?