Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Undetectable on-line password guessing attacks
ACM SIGOPS Operating Systems Review
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
Efficient three-party key exchange using smart cards
IEEE Transactions on Consumer Electronics
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
In 2007, Kwon et al. proposed a three-round protocol, SKE, for smart card-based key exchange in the three-party setting which provides both key independence and forward secrecy. This paper demonstrates the vulnerability of the SKE protocol and then presents an improvement to repair the security flaws of the SKE protocol.