Unknown key-share attack

As defined by , an unknown key-share (UKS) attack on an authenticated key agreement (AK) or authenticated key agreement with key confirmation (AKC… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2001-2016
012320012016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Three-party password authenticated key exchange protocol is a very practical mechanism to establish secure session key through… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
2011
2011
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve… (More)
  • table 1
  • figure 1
Is this relevant?
2010
2010
All the current public-key cryptosystems will become insecure when size of a quantum register is sufficient. An Authenticated key… (More)
Is this relevant?
2009
2009
Quite recently, Yang et al. presented an efficient three-party authenticated key exchange protocol based upon elliptic curve… (More)
Is this relevant?
2009
2009
Group key agreement protocol is a effective solution to establish a common session key for communication in Ad Hoc network. But… (More)
  • table 2
Is this relevant?
2008
2008
in a non cylindrical domain. This model, without the resistance represented for f(u), is a linearization of Kirchhoff’s equation… (More)
Is this relevant?
2005
2005
In this paper, we show that the ID-based tripartite authenticated multiple-key agreement protocol by Liu et al. [ID-based… (More)
Is this relevant?
2004
2004
Mutual authentication and key exchange protocols (MAKEP) provide two parties in communication with guarantee of true identity… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Authentication and key establishment are fundamental building blocks for securing electronic communication. Cryptographic… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The MQV key agreement protocol, a technique included in recent standards, is shown in its basic form to be vulnerable to an… (More)
Is this relevant?