Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Three-pass protocol

Known as: Massey-Omura cryptosystem, Shamir three-pass algorithm, Three pass protocol 
In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
This study aims to cover the shortcomings of the one-time pad algorithm used in the Shamir's three-pass protocol scheme. In this… Expand
Is this relevant?
2017
2017
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Abstract Most of the currently available Heterogeneous protocols operate on the basis of reliable and secured communication… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Encryption is imperative in the world of computers. Delivery of data requires a technique that the data is free from attack. Hill… Expand
  • figure 1
  • table 1
Is this relevant?
2015
2015
A realizable quantum three-pass protocol authentication based on Hill-cipher algorithm is presented by encoded and decoded… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2010
2010
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key… Expand
Is this relevant?
2008
2008
For extending Shamir's three-pass protocol to more fields,a novel implementation of the protocol was presented by MFRFT operator… Expand
Is this relevant?
2007
2007
This paper proposes an alternative cryptography protocol based on padding for wireless networks. It uses an orthogonal set of… Expand
  • figure 1
  • figure 2
  • table I
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper proposes an efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The… Expand
Is this relevant?
2002
2002
We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which… Expand
Is this relevant?