has been cited by the following article(s):
[1]
|
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
International Journal of Communication Systems,
2016
DOI:10.1002/dac.2899
|
|
|
[2]
|
Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction
International Journal of Communication Systems,
2016
DOI:10.1002/dac.2899
|
|
|
[3]
|
Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique
International Journal of Communication Systems,
2015
DOI:10.1002/dac.2671
|
|
|
[4]
|
Authenticated key exchange protocol under computational Diffie–Hellman assumption from trapdoor test technique
International Journal of Communication Systems,
2015
DOI:10.1002/dac.2671
|
|
|