+

Zhao et al., 2015 - Google Patents

Security analysis of SM2 key exchange protocol in TPM2. 0

Zhao et al., 2015

Document ID
6982245003939162192
Author
Zhao S
Xi L
Zhang Q
Qin Y
Feng D
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

The new released trusted platform module (TPM) specification, TPM2. 0, adds cryptographic support for key exchange by providing SM2 authenticated key exchange (AKE) application programming interface (API) commands. Xu analyzed the SM2 AKE protocol and found that …
Continue reading at onlinelibrary.wiley.com (other versions)

Similar Documents

Publication Publication Date Title
Bera et al. Designing blockchain-based access control protocol in IoT-enabled smart-grid system
Tsai et al. Novel anonymous authentication scheme using smart cards
Camenisch et al. Optimal distributed password verification
TWI233739B (en) Systems, methods and computer readable recording medium for remote password authentication using multiple servers
Das et al. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
EP3939202B1 (en) Method and apparatus for effecting a data-based activity
Amin et al. A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments
Cremers et al. One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability.
Dong et al. Cryptographic protocol
Zhao et al. Security analysis of SM2 key exchange protocol in TPM2. 0
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
Kumar et al. An Enhanced RFID‐Based Authentication Protocol using PUF for Vehicular Cloud Computing
Chhikara et al. Construction of elliptic curve cryptography‐based authentication protocol for internet of things
Miculan et al. Automated Symbolic Verification of Telegram's MTProto 2.0
Abusukhon et al. An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm
Farash Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’
Badar et al. An access control protocol for IoT‐based critical infrastructure in smart grid environment
Wu et al. A Blockchain‐Based Hierarchical Authentication Scheme for Multiserver Architecture
Li et al. A simple and robust anonymous two‐factor authenticated key exchange protocol
Qian et al. Anonymous password‐based key exchange with low resources consumption and better user‐friendliness
Lin et al. On ‘a simple three‐party password‐based key exchange protocol’
Rajamanickam et al. EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario
Wen et al. Unified security model of authenticated key exchange with specific adversarial capabilities
Wang et al. Efficient privacy preserving matchmaking for mobile social networking
Das et al. A Robust and Effective Smart‐Card‐Based Remote User Authentication Mechanism Using Hash Function
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载