Author of the publication

Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol.

, , , and . IACR Cryptology ePrint Archive, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CACPA: Credible Alliance-Chain-Based Public Auditing Scheme for Cloud Storage., , , , and . IEEE Access, (2023)Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing., , and . Int. J. Netw. Secur., 7 (3): 342-347 (2008)Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy., , and . Int. J. Netw. Secur., 7 (2): 181-186 (2008)Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings., , and . IMSCCS (2), page 109-112. IEEE Computer Society, (2006)0-7695-2581-4.Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications., and . IACR Cryptology ePrint Archive, (2007)Security-Enhanced Lightweight and Anonymity-Preserving User Authentication Scheme for IoT-Based Healthcare., , , , , and . IEEE Internet Things J., 11 (6): 9599-9609 (March 2024)On the anonymity of some authentication schemes for wireless communications., , , and . IEEE Commun. Lett., 13 (3): 170-171 (2009)Security weakness in a dynamic program update protocol for wireless sensor networks., , , and . IEEE Commun. Lett., 13 (6): 426-428 (2009)Analysis of USBSCAN Driver., , and . ICMLSC, page 187-190. ACM, (2017)New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)., , and . IACR Cryptology ePrint Archive, (2006)