Cryptology ePrint Archive: Report 2009/534
Available versions in chronological order
20091105:051952 (posted 05-Nov-2009 05:19:52 UTC)
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu
20100704:011354 (posted 04-Jul-2010 01:13:54 UTC)
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
S. Wu
[
Cryptology ePrint archive
]