-
1
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
D. Naccache, editor, CT-RSA 2001, Springer-Verlag, Apr.
-
M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In D. Naccache, editor, CT-RSA 2001, volume 2020 of LNCS, pages 143-158. Springer-Verlag, Apr. 2001.
-
(2001)
LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
33645603831
-
Simple password-based encrypted key exchange protocols
-
Available from authors' web pages
-
M. Abdalla and D. Pointcheval. Simple password-based encrypted key exchange protocols. Full version of current paper. Available from authors' web pages.
-
Full Version of Current Paper
-
-
Abdalla, M.1
Pointcheval, D.2
-
3
-
-
35248860702
-
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
-
E. Biham, editor, EUROCRYPT 2003, Springer-Verlag, May
-
M. Bellare and T. Kohno. A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 491-506. Springer-Verlag, May 2003.
-
(2003)
LNCS
, vol.2656
, pp. 491-506
-
-
Bellare, M.1
Kohno, T.2
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
B. Preneel, editor, EUROCRYPT 2000, Springer-Verlag, May
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In B. Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 139-155. Springer-Verlag, May 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
84945119254
-
Entity authentication and key distribution
-
D. R. Stinson, editor, CRYPTO'93, Springer-Verlag, Aug.
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, CRYPTO'93, volume 773 of LNCS. Springer-Verlag, Aug. 1994.
-
(1994)
LNCS
, vol.773
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0001940580
-
Provably secure session key distribution - The three party case
-
ACM Press, May
-
M. Bellare and P. Rogaway. Provably secure session key distribution - the three party case. In 28th ACM STOC, pages 57-66. ACM Press, May 1996.
-
(1996)
28th ACM STOC
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press, May
-
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In 1992 IEEE Symposium on Security and Privacy, pages 72-84. IEEE Computer Society Press, May 1992.
-
(1992)
1992 IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
9
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
B. Preneel, editor, EUROCRYPT 2000, Springer-Verlag, May
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In B. Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 156-171. Springer-Verlag, May 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
10
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
ACM Press, Oct.
-
E. Bresson, O. Chevassut, and D. Pointcheval. Security proofs for an efficient password-based key exchange. In ACM CCS 03. ACM Press, Oct. 2003.
-
(2003)
ACM CCS 03
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
35048866891
-
New security results on encrypted key exchange
-
F. Bao, R. Deng, and J. Zhou, editors, PKC 2004, Springer-Verlag, Mar.
-
E. Bresson, O. Chevassut, and D. Pointcheval. New security results on encrypted key exchange. In F. Bao, R. Deng, and J. Zhou, editors, PKC 2004, volume 2947 of LNCS, pages 145-158. Springer-Verlag, Mar. 2004.
-
(2004)
LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
35248822669
-
Provably secure threshold password-authenticated key exchange
-
E. Biham, editor, EUROCRYPT 2003, Springer-Verlag, May
-
M. Di Raimondo and R. Gennaro. Provably secure threshold password-authenticated key exchange. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 507-523. Springer-Verlag, May 2003.
-
(2003)
LNCS
, vol.2656
, pp. 507-523
-
-
Di Raimondo, M.1
Gennaro, R.2
-
13
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
E. Biham, editor, EUROCRYPT 2003, Springer-Verlag, May
-
R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In E. Biham, editor, EUROCRYPT 2003, volume 2656 of LNCS, pages 524-543. Springer-Verlag, May 2003. http://eprint.iacr.org/2003/032.ps.gz.
-
(2003)
LNCS
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
14
-
-
84880888233
-
Session-key generation using human passwords only
-
J. Kilian, editor, CRYPTO 2001, Springer-Verlag, Aug.
-
O. Goldreich and Y. Lindell. Session-key generation using human passwords only. In J. Kilian, editor, CRYPTO 2001, volume 2139 of LNCS, pages 408-432. Springer-Verlag, Aug. 2001. http://eprint.iacr.org/2000/057.ps.gz.
-
(2001)
LNCS
, vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
16
-
-
18744364016
-
-
IEEE draft standard P1363.2. May. Draft Version 15
-
IEEE draft standard P1363.2. Password-based public key cryptography. http://grouper.ieee.org/groups/1363/passwdPK, May 2004. Draft Version 15.
-
(2004)
Password-based Public Key Cryptography
-
-
-
17
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
B. Pfitzmann, editor, EUROCRYPT 2001, Springer-Verlag, May
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In B. Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 475-494. Springer-Verlag, May 2001.
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
18
-
-
0036825859
-
Pretty-simple password-authenticated key-exchange under standard assumptions
-
Oct.
-
K. Kobara and H. Imai. Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Transactions, E85-A(10):2229-2237, Oct. 2002. Also available at http://eprint.iacr.org/2003/038/.
-
(2002)
IEICE Transactions
, vol.E85-A
, Issue.10
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
19
-
-
35248816546
-
SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols
-
D. Boneh, editor, CRYPTO 2003, Springer-Verlag, Aug.
-
H. Krawczyk. SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols. In D. Boneh, editor, CRYPTO 2003, volume 2729 of LNCS, pages 400-425. Springer-Verlag, Aug. 2003.
-
(2003)
LNCS
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
20
-
-
84937402236
-
Password-authenticated key exchange based on RSA
-
T. Okamoto, editor, ASIACRYPT 2000, Springer-Verlag, Dec.
-
P. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In T. Okamoto, editor, ASIACRYPT 2000, volume 1976 of LNCS, pages 599-613. Springer-Verlag, Dec. 2000.
-
(2000)
LNCS
, vol.1976
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
22
-
-
84937438236
-
Threshold password-authenticated key exchange
-
M. Yung, editor, CRYPTO 2002, Springer-Verlag, Aug.
-
P. D. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold password-authenticated key exchange. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 385-400. Springer-Verlag, Aug. 2002.
-
(2002)
LNCS
, vol.2442
, pp. 385-400
-
-
MacKenzie, P.D.1
Shrimpton, T.2
Jakobsson, M.3
|