-
3
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.: 'Strong password-only authenticated key exchange', Comput. Commun. Rev., 1996, 26, (5), pp. 5-26
-
(1996)
Comput. Commun. Rev.
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
4
-
-
84937550984
-
Provably secure password authenticated key exchange using diffie-hellman
-
Boyko, V., MacKenzie, P., and Patel, S.: 'Provably secure password authenticated key exchange using diffie-hellman'. Advances in cryptology - EUROCRYPT 2000, 2000, pp. 156-171
-
(2000)
Advances in Cryptology - EUROCRYPT 2000
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
5
-
-
0010254150
-
Authenticated key exchange secure against dictionary attack
-
Bellare, M., Pointcheval, D., and Rogaway, P.: 'Authenticated key exchange secure against dictionary attack'. Advances in cryptology EUROCRYPT 2000, 2000, pp. 122-138
-
(2000)
Advances in Cryptology EUROCRYPT 2000
, pp. 122-138
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password fild compromise
-
Bellovin, S.M., and Merritt, M.: 'Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password fild compromise'. Proc. ACM Conf. Computers and Communication Security, 1993, pp. 244-250
-
(1993)
Proc. ACM Conf. Computers and Communication Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
7
-
-
0013443819
-
Extended password methods immune to dictionary attack
-
Cambridge, MA, USA
-
Jablon, D.: 'Extended password methods immune to dictionary attack'. Presented at WETIGE'97 Enterprise Security Workshop, Cambridge, MA, USA, 1997
-
(1997)
WETIGE'97 Enterprise Security Workshop
-
-
Jablon, D.1
-
9
-
-
0032640752
-
xy via password authentication
-
xy via password authentication', Electron. Lett., 1999, 35, (11), pp. 892-893
-
(1999)
Electron. Lett.
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
-
10
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong, L., Lomas, M., Needham, R., and Saltzer, J.: 'Protecting poorly chosen secrets from guessing attacks', IEEE J. Sel. Areas Commun., 1993, 11, (5), pp. 648-656
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
11
-
-
0029531472
-
Optimal authentication protocol resistant password guessing attack
-
County Kerry, Ireland, June
-
Gong, L.: 'Optimal authentication protocol resistant password guessing attack'. Proc. 8th IEEE Computer Security Foundations Workshop, County Kerry, Ireland, June 1995, pp. 24-29
-
(1995)
Proc. 8th IEEE Computer Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
12
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
Steiner, M., Tsudik, G., and Waidner, M.: 'Refinement and extension of encrypted key exchange', ACM Operating Syst. Rev., 1995, 29, (3), pp. 22-30
-
(1995)
ACM Operating Syst. Rev.
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
13
-
-
0033157651
-
An improvement of the password-based authentication protocol (kip) on security against replay attacks
-
Kwon, T., Kang, M., Jung, S., and Song, J.: 'An improvement of the password-based authentication protocol (kip) on security against replay attacks', IEICE Trans. Commun., 1999, E82-B, (7), pp. 991-997
-
(1999)
IEICE Trans. Commun.
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
14
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
Lin, C., Sung, H., and Hwang, T.: "Three-party encrypted key exchange: Attacks and a solution', ACM Operating Syst. Rev., 2000, 34, (4), pp. 12-20
-
(2000)
ACM Operating Syst. Rev.
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sung, H.2
Hwang, T.3
-
15
-
-
0009733453
-
One round protocol for tripartite Diffiie-Hellman
-
lncs 1838
-
Joux, A.: 'One round protocol for tripartite Diffiie-Hellman'. Proc. of ANTS 4, lncs 1838, 2000, pp. 385-394
-
(2000)
Proc. of ANTS 4
, pp. 385-394
-
-
Joux, A.1
-
17
-
-
21644456068
-
Identity-based authenticated key agreement protocol based on Weil pairing
-
Smart, N.: 'Identity-based authenticated key agreement protocol based on Weil pairing', Electron. Lett., 2003, 39, (2), pp. 208-209
-
(2003)
Electron. Lett.
, vol.39
, Issue.2
, pp. 208-209
-
-
Smart, N.1
-
18
-
-
21644440761
-
Efficient one round tripartite authenticated key agreement protocol from Weil pairing
-
Shim, K.: 'Efficient one round tripartite authenticated key agreement protocol from Weil pairing', Electron. Lett., 2002, 38, (13), pp. 630-632
-
(2002)
Electron. Lett.
, vol.38
, Issue.13
, pp. 630-632
-
-
Shim, K.1
-
19
-
-
0037461946
-
Efficient id-based key agreement protocol from weil pairing
-
Yi, X.: 'Efficient id-based key agreement protocol from weil pairing', Electron. Lett., 2003, 39, (2), pp. 206-208
-
(2003)
Electron. Lett.
, vol.39
, Issue.2
, pp. 206-208
-
-
Yi, X.1
-
20
-
-
84946840347
-
Short signtures from the weil pairing
-
Boneh, D., Lynn, B., and Shacham, H.: 'Short signtures from the weil pairing'. Advances in cryptology - ASIACRYPT 2001, 2001, pp. 514-532
-
(2001)
Advances in Cryptology - ASIACRYPT 2001
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
23
-
-
0029543006
-
Efficient network authentification protocols: Lower bounds and implementations
-
Gong, L.: 'Efficient network authentification protocols: Lower bounds and implementations', Distrib. Comput., 1995, 9, (3), pp. 131-145
-
(1995)
Distrib. Comput.
, vol.9
, Issue.3
, pp. 131-145
-
-
Gong, L.1
-
25
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A.J., Okamoto, T., and Vanstone, S.: 'Reducing elliptic curve logarithms to logarithms in a finite field'. IEEE Trans. Inf. Theory, 1993, 39, (5), pp. 1639-1646
-
(1993)
IEEE Trans. Inf. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.3
|