Zhao et al., 2015 - Google Patents
Security analysis of SM2 key exchange protocol in TPM2. 0Zhao et al., 2015
- Document ID
- 6982245003939162192
- Author
- Zhao S
- Xi L
- Zhang Q
- Qin Y
- Feng D
- Publication year
- Publication venue
- Security and Communication Networks
External Links
Snippet
The new released trusted platform module (TPM) specification, TPM2. 0, adds cryptographic support for key exchange by providing SM2 authenticated key exchange (AKE) application programming interface (API) commands. Xu analyzed the SM2 AKE protocol and found that …
- 102100009344 TPM2 0 title abstract 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bera et al. | Designing blockchain-based access control protocol in IoT-enabled smart-grid system | |
Tsai et al. | Novel anonymous authentication scheme using smart cards | |
Camenisch et al. | Optimal distributed password verification | |
TWI233739B (en) | Systems, methods and computer readable recording medium for remote password authentication using multiple servers | |
Das et al. | An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system | |
EP3939202B1 (en) | Method and apparatus for effecting a data-based activity | |
Amin et al. | A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments | |
Cremers et al. | One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. | |
Dong et al. | Cryptographic protocol | |
Zhao et al. | Security analysis of SM2 key exchange protocol in TPM2. 0 | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
Kumar et al. | An Enhanced RFID‐Based Authentication Protocol using PUF for Vehicular Cloud Computing | |
Chhikara et al. | Construction of elliptic curve cryptography‐based authentication protocol for internet of things | |
Miculan et al. | Automated Symbolic Verification of Telegram's MTProto 2.0 | |
Abusukhon et al. | An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm | |
Farash | Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’ | |
Badar et al. | An access control protocol for IoT‐based critical infrastructure in smart grid environment | |
Wu et al. | A Blockchain‐Based Hierarchical Authentication Scheme for Multiserver Architecture | |
Li et al. | A simple and robust anonymous two‐factor authenticated key exchange protocol | |
Qian et al. | Anonymous password‐based key exchange with low resources consumption and better user‐friendliness | |
Lin et al. | On ‘a simple three‐party password‐based key exchange protocol’ | |
Rajamanickam et al. | EAPIOD: ECC based authentication protocol for insider attack protection in IoD scenario | |
Wen et al. | Unified security model of authenticated key exchange with specific adversarial capabilities | |
Wang et al. | Efficient privacy preserving matchmaking for mobile social networking | |
Das et al. | A Robust and Effective Smart‐Card‐Based Remote User Authentication Mechanism Using Hash Function |