-
1
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk, A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols, STOC 98:419-428.
-
STOC
, vol.98
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Mihir Bellare, David Pointcheval, Phillip Rogaway:Authenticated Key Exchange Secure against Dictionary Attacks. EUROCRYPT 2000:139-155.
-
EUROCRYPT
, vol.2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Mihir Bellare, Phillip Rogaway:Entity Authentication and Key Distribution. CRYPTO 1993:232-249.
-
CRYPTO
, vol.1993
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0026850091
-
Encrypted key exchange:password-based protocols secure against dictionary attacks
-
Bellovin, S.M.; Merritt, M., Encrypted key exchange:password-based protocols secure against dictionary attacks, IEEE S&P'92, 72-84.
-
IEEE S&P'92
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
0027741529
-
Augmented Encrypted Key Exchange:A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
-
Steven M. Bellovin, Michael Merritt:Augmented Encrypted Key Exchange:A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM CCS'93:244-250.
-
ACM CCS'93
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
7
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Victor Boyko, Philip D. MacKenzie, Sarvar Patel:Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. EUROCRYPT 2000:156-171.
-
(2000)
EUROCRYPT
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
8
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Ran Canetti and Hugo Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, Eurocrypt 2001:453-474.
-
(2001)
Eurocrypt
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
9
-
-
0031619016
-
The Random Oracle Methodology, Revisited (Preliminary Version)
-
Ran Canetti, Oded Goldreich, Shai Halevi:The Random Oracle Methodology, Revisited (Preliminary Version). STOC 1998:209-218.
-
(1998)
STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
10
-
-
84870707379
-
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
-
Ronald Cramer, Victor Shoup:A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. CRYPTO 1998:13-25.
-
(1998)
CRYPTO
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener, Authentication and Authenticated Key Exchanges, Designs, Codes and Cryptography, vol. 2, no. 2, 1992, pp. 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
13
-
-
35248830706
-
A Framework for Password-Based Authenticated Key Exchange
-
Rosario Gennaro, Yehuda Lindell:A Framework for Password-Based Authenticated Key Exchange. EUROCRYPT 2003:524-543.
-
(2003)
EUROCRYPT
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
14
-
-
84880888233
-
Session-Key Generation Using Human Passwords only
-
Oded Goldreich, Yehuda Lindell:Session-Key Generation Using Human Passwords Only. CRYPTO 2001:408-432.
-
(2001)
CRYPTO
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
15
-
-
0032218224
-
Public-Key Cryptography and Password Protocols
-
Shai Halevi, Hugo Krawczyk:Public-Key Cryptography and Password Protocols. ACM CCS'98:122-131.
-
ACM CCS'98
, pp. 122-131
-
-
Halevi, S.1
Krawczyk, H.2
-
16
-
-
0031354417
-
Extended Password Key Exchange Protocols Immune to Dictionary Attacks
-
David P. Jablon, Extended Password Key Exchange Protocols Immune to Dictionary Attacks. WETICE 1997:248-255.
-
(1997)
WETICE
, pp. 248-255
-
-
Jablon, D.P.1
-
17
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Jonathan Katz, Rafail Ostrovsky, Moti Yung:Efficient Password- Authenticated Key Exchange Using Human-Memorable Passwords. EUROCRYPT 2001:475-494.
-
(2001)
EUROCRYPT
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
18
-
-
0345686108
-
How to Defeat Dictionary Attacks Without Encrypting Public Keys
-
Stefan Lucks, Open Key Exchange:How to Defeat Dictionary Attacks Without Encrypting Public Keys. Security Protocols Workshop 1997:79-90.
-
(1997)
Security Protocols Workshop
, pp. 79-90
-
-
Lucks, S.1
Exchange, O.K.2
|