Cryptology ePrint Archive: Report 2009/534

Available versions in chronological order


Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu

Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu


[ Cryptology ePrint archive ]