Three-pass protocol

Known as: Shamir three-pass algorithm, Three pass protocol, Massey-Omura three-pass protocol 
In cryptography, a three-pass protocol for sending messages is a framework which allows one party to securely send a message to a second party… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2018
01219982018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Key transport protocols are designed to transfer a secret key from an initiating principal to other entities in a network. The… (More)
  • figure 1
Is this relevant?
2017
2017
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
The Shamir three-pass protocol, which is also called Shamir no key protocol, is a cryptographic protocol that allows two parties… (More)
  • figure 1
Is this relevant?
2017
2017
Vulnerability(s) and attack(s) can occur on the proxy or during translation protocol of secure transport protocols in Constrained… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2017
2017
Most of the currently available Heterogeneous protocols operate on the basis of reliable and secured communication environment… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2014
Review
2014
Can J Respir Ther Vol 50 No 2 Summer 2014 52 5. Ramos K, Schafer S, Tracz S. Validation of the Fresno test of competence in… (More)
  • table 1
  • table 2
  • table 1
Is this relevant?
2014
2014
The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. in… (More)
Is this relevant?
2009
2009
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key… (More)
Is this relevant?
2007
2007
This paper proposes an alternative cryptography protocol based on padding for wireless networks. It uses an orthogonal set of… (More)
  • figure 1
  • figure 2
  • table I
Is this relevant?
2004
2004
We present a model-theoretic approach for reasoning about security protocols, applying recent insights from dynamic epistemic… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?