-
1
-
-
1842514161
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
LNCS 2020, Springer-Verlag, Apr.
-
M. Abdalla, M. Bellare, and P. Rogaway. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In CT-RSA 2001, LNCS 2020, Springer-Verlag, Apr. 2001.
-
(2001)
CT-RSA 2001
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
LNCS 1109, Springer-Verlag, Aug.
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO'96, LNCS 1109, Springer-Verlag, Aug. 1996.
-
(1996)
CRYPTO'96
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
0010254150
-
Authenticated key exchange secure against dictionary attacks
-
LNCS 1807, Springer-Verlag, May
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, LNCS 1807, Springer-Verlag, May 2000.
-
(2000)
EUROCRYPT 2000
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Nov.
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS 93, Nov. 1993.
-
(1993)
ACM CCS 93
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS 773, Springer-Verlag, Aug.
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO'93, LNCS 773, Springer-Verlag, Aug. 1994.
-
(1994)
CRYPTO'93
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0001940580
-
Provably secure session key distribution - The three party case
-
May
-
M. Bellare and P. Rogaway. Provably secure session key distribution - the three party case. In 28th ACM STOC, May 1996.
-
(1996)
28th ACM STOC
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
May
-
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In 1992 IEEE Symposium on Security and Privacy, May 1992.
-
(1992)
1992 IEEE Symposium on Security and Privacy
-
-
Bellovin, S.M.1
Merritt, M.2
-
10
-
-
3042657129
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
LNCS 1807, Springer-Verlag, May
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In EUROCRYPT 2000, LNCS 1807, Springer-Verlag, May 2000.
-
(2000)
EUROCRYPT 2000
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
11
-
-
35048866891
-
New security results on encrypted key exchange
-
LNCS 2947, Springer-Verlag, Mar.
-
E. Bresson, O. Chevassut, and D. Pointcheval. New security results on encrypted key exchange. In PKC 2004, LNCS 2947, Springer-Verlag, Mar. 2004.
-
(2004)
PKC 2004
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
84944063128
-
Password-authenticated key exchange between clients with different passwords
-
LNCS 2513, Springer-Verlag, Dec.
-
J. W. Byun, I. R. Jeong, D. H. Lee, and C.-S. Park. Password-authenticated key exchange between clients with different passwords. In ICICS 02, LNCS 2513, Springer-Verlag, Dec. 2002.
-
(2002)
ICICS 02
-
-
Byun, J.W.1
Jeong, I.R.2
Lee, D.H.3
Park, C.-S.4
-
13
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
LNCS 2656, Springer-Verlag, May
-
R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In EUROCRYPT 2003, LNCS 2656, Springer-Verlag, May 2003.
-
(2003)
EUROCRYPT 2003
-
-
Gennaro, R.1
Lindell, Y.2
-
14
-
-
84880888233
-
Session-key generation using human passwords only
-
LNCS 2139, Springer-Verlag, Aug.
-
O. Goldreich and Y. Lindell. Session-key generation using human passwords only. In CRYPTO 2001, LNCS 2139, Springer-Verlag, Aug. 2001.
-
(2001)
CRYPTO 2001
-
-
Goldreich, O.1
Lindell, Y.2
-
16
-
-
23044527599
-
Efficient password-authenticated key exchange using human-memorable passwords
-
LNCS 2045, Springer-Verlag, May
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001, LNCS 2045, Springer-Verlag, May 2001.
-
(2001)
EUROCRYPT 2001
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
17
-
-
35248816546
-
SIGMA: The "SIGn-and-MAc" approach to authenticated DiffieHellman and its use in the ike protocols
-
LNCS 2729, Springer-Verlag, Aug.
-
H. Krawczyk. SIGMA: The "SIGn-and-MAc" approach to authenticated DiffieHellman and its use in the ike protocols. In CRYPTO 2003, LNCS 2729, Springer-Verlag, Aug. 2003.
-
(2003)
CRYPTO 2003
-
-
Krawczyk, H.1
-
18
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
Oct.
-
C.-L. Lin, H.-M. Sun, and T. Hwang. Three-party encrypted key exchange: Attacks and a solution. ACM SIGOPS Operating Systems Review, 34(4): 12-20, Oct. 2000.
-
(2000)
ACM SIGOPS Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.-L.1
Sun, H.-M.2
Hwang, T.3
-
19
-
-
0013276119
-
Password-authenticated key exchange based on RSA
-
LNCS 1976, Springer-Verlag, Dec.
-
P. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In ASIACRYPT 2000, LNCS 1976, Springer-Verlag, Dec. 2000.
-
(2000)
ASIACRYPT 2000
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
20
-
-
84937438236
-
Threshold password-authenticated key exchange
-
LNCS 2442, Springer-Verlag, Aug.
-
P. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold password-authenticated key exchange. In CRYPTO 2002, LNCS 2442, Springer-Verlag, Aug. 2002.
-
(2002)
CRYPTO 2002
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
21
-
-
33645605444
-
The PAK suite: Protocols for password-authenticated key exchange
-
P. D. MacKenzie. The PAK suite: Protocols for password-authenticated key exchange. Contributions to IEEE P1363.2, 2002.
-
(2002)
Contributions to IEEE P1363.2
-
-
MacKenzie, P.D.1
-
22
-
-
0018048246
-
Using encryption for authentication in large net-works of computers
-
Dec.
-
R. Needham and M. Schroeder. Using encryption for authentication in large net-works of computers. Communications of the ACM, 21(21):993-999, Dec. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
23
-
-
35248822669
-
Provably secure threshold password-authen-ticated key exchange
-
LNCS 2656, Springer-Verlag, May
-
M. D. Raimondo and R. Gennaro. Provably secure threshold password-authen-ticated key exchange. In EUROCRYPT 2003, LNCS 2656, Springer-Verlag, May 2003.
-
(2003)
EUROCRYPT 2003
-
-
Raimondo, M.D.1
Gennaro, R.2
-
24
-
-
0004023090
-
On formal models for secure key exchange
-
IBM
-
V. Shoup. On formal models for secure key exchange. Technical Report RZ 3120, IBM, 1999.
-
(1999)
Technical Report
, vol.RZ 3120
-
-
Shoup, V.1
-
26
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
July
-
M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM SIGOPS Operating Systems Review, 29(3):22-30, July 1995.
-
(1995)
ACM SIGOPS Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|