Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,849,344 papers from all fields of science
Search
Sign In
Create Free Account
Three-pass protocol
Known as:
Massey-Omura cryptosystem
, Shamir three-pass algorithm
, Three pass protocol
Expand
In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Authentication
Ciphertext
Circular shift
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Impact three pass protocol modifications to key transmission performance
A. Badawi
,
M. Zarlis
,
S. Suherman
Journal of Physics: Conference Series
2019
Corpus ID: 199583703
Key exchange is important to ensure cryptography works as expected. The three pass protocol (TPP) is the popular key exchange…
Expand
2019
2019
Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol
Darsono Nababan
,
R. Rahim
Journal of Physics: Conference Series
2019
Corpus ID: 213313741
Protocols Secret Sharing is a method used to divide or break a secret message to 2 (two) or more recipients so that another…
Expand
2018
2018
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
Dian Rachmawati
,
M. A. Budiman
,
L. Aulya
2018
Corpus ID: 196112702
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is…
Expand
2018
2018
Message Security on Chat App based on Massey Omura Algorithm
Taronisokhi Zebua
,
Rivalri Kristianto Hondro
,
Eferoni Ndruru
2018
Corpus ID: 59001705
Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not…
Expand
2017
2017
An implementation of the H-rabin algorithm in the shamir three-pass protocol
D. Rachmawati
,
M. A. Budiman
2nd International Conference on Automation…
2017
Corpus ID: 42417878
The Shamir three-pass protocol, which is also called Shamir no key protocol, is a cryptographic protocol that allows two parties…
Expand
2015
2015
Modified Quantum Three Pass Protocol Based on Hybrid Cryptosystem
Alharith A Abdullah
2015
Corpus ID: 58561790
Doctor of Philosophy in Computer Engineering. Thesis (M.S.)--Eastern Mediterranean University, Faculty of Engineering, Dept. of…
Expand
2011
2011
Attack interference in non-collaborative scenarios for security protocol analysis
M. Fiazza
,
Michele Peroli
,
L. Viganò
Proceedings of the International Conference on…
2011
Corpus ID: 8499645
In security protocol analysis, the traditional choice to consider a single Dolev-Yao attacker is supported by the fact that…
Expand
2010
2010
Quantum Three-Pass protocol: Key distribution using quantum superposition states
Y. Kanamori
,
S. Yoo
arXiv.org
2010
Corpus ID: 11835275
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key…
Expand
2008
2008
Application of MFRFT to the Shamir's Three-pass Protocol
Wang Yue
2008
Corpus ID: 124247067
For extending Shamir's three-pass protocol to more fields,a novel implementation of the protocol was presented by MFRFT operator…
Expand
2002
2002
Quantum three-pass cryptography protocol
Li Yang
,
Ling-An Wu
,
Song-hao Liu
SPIE/COS Photonics Asia
2002
Corpus ID: 121488737
We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE