-
1
-
-
84937579774
-
The oracle diffie-hellman assumptions and an analysis of DHIES
-
LNCS Springer-Verlag
-
M. Abdalla, M. Bellare, and P. Rogaway, "The oracle diffie-hellman assumptions and an analysis of DHIES", In proceedings of CT-RSA 2001, LNCS Vol. 2020, pp. 143-158, Springer-Verlag, 2001.
-
(2001)
Proceedings of CT-RSA 2001
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
LNCS Springer-Verlag
-
M. Abdalla, P. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting", In proceedings of PKC'05, LNCS Vol. 3386, pp. 65-84, Springer-Verlag, 2005.
-
(2005)
Proceedings of PKC'05
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", In proceedings of Eurocrypt'00, LNCS Vol.1807, pp. 139-155, Springer-Verlag, 2000.
-
(2000)
Proceedings of Eurocrypt'00
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS Springer-Verlag
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution", In proceedings of Crypto'93, LNCS Vol. 773, pp. 232-249. Springer-Verlag, 1994.
-
(1994)
Proceedings of Crypto'93
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0026850091
-
Encrypted key exchange: Password based protocols secure against dictionary attacks
-
IEEE
-
S. Bellovin and M. Merrit, "Encrypted key exchange: password based protocols secure against dictionary attacks", In proceedings of the Symposium on Security and Privacy, pp.72-84, IEEE, 1992.
-
(1992)
Proceedings of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merrit, M.2
-
8
-
-
84949230533
-
Key agreement protocols and their security analysis
-
LNCS Springer-Verlag
-
S. Blake-Wilson, D. Jhonson, and A. Menezes, "Key agreement protocols and their security analysis", In proceedings of IMA international conference, LNCS Vol. 1361, pp. 30-45, Springer-Verlag, 1997.
-
(1997)
Proceedings of IMA International Conference
, vol.1361
, pp. 30-45
-
-
Blake-Wilson, S.1
Jhonson, D.2
Menezes, A.3
-
9
-
-
26444519832
-
A survey of dependability issues in mobile wireless networks
-
LAAS CNRS Toulouse, France, February
-
C. Basile, M-O. Killijian, and D. Powell, "A survey of dependability issues in mobile wireless networks", Technical Report, LAAS CNRS Toulouse, France, February, 2003. Availabe at http://www.crhc.uiuc.edu/~basilecl/papers/ mobile.ps
-
(2003)
Technical Report
-
-
Basile, C.1
Killijian, M.-O.2
Powell, D.3
-
10
-
-
84956854891
-
Key establishment protocols for secure mobile communications : A selective survey
-
LNCS Springer-Verlag
-
C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications : a selective survey", In proceedings of ACISP 98', LNCS Vol. 1438, pp. 344-355, Springer-Verlag, 1998.
-
(1998)
Proceedings of ACISP 98'
, vol.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
11
-
-
84958755223
-
Group diffie-hellman key exchange secure against dictionary attacks
-
LNCS Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Group diffie-hellman key exchange secure against dictionary attacks", In proceedings of Asiacrypt'02, LNCS Vol. 2501, pp. 497-514, Springer-Verlag, 2002.
-
(2002)
Proceedings of Asiacrypt'02
, vol.2501
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
0035751060
-
Provably authenticated group diffie-hellman key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater, "Provably authenticated group diffie-hellman key exchange", In proceedings of 8th ACM Conference on Computer and Communications Security, pp. 255-264, 2001.
-
(2001)
Proceedings of 8th ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
13
-
-
50849127145
-
Provably authenticated group diffie-hellman key exchange in the dynamic case
-
LNCS Springer-Verlag
-
E. Bresson, O. Chevassut, D. Pointcheval, and J. J. Quisquater, "Provably authenticated group diffie-hellman key exchange in the dynamic case", In proceedings of Asiacrypt'01, LNCS Vol. 2248, pp. 290-309, Springer-Verlag, 2001.
-
(2001)
Proceedings of Asiacrypt'01
, vol.2248
, pp. 290-309
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.J.4
-
14
-
-
50849092893
-
Dynamic group diffie-hellman key exchange under standard assumptions
-
LNCS
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Dynamic group diffie-hellman key exchange under standard assumptions", In proceedings of Eurocrypt'02, LNCS Vol. 2332, pp. 321-336, 2002.
-
(2002)
Proceedings of Eurocrypt'02
, vol.2332
, pp. 321-336
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
15
-
-
35248849912
-
The group diffie-hellman problems
-
LNCS Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval, "The group diffie-hellman problems", In proceedings of SAC'02, LNCS Vol. 2595, pp. 325-338, Springer-Verlag, 2002.
-
(2002)
Proceedings of SAC'02
, vol.2595
, pp. 325-338
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
16
-
-
84944886613
-
Ciphers with arbitrary finite domains
-
LNCS Springer-Verlag
-
J. Black and P. Rogaway, "Ciphers with arbitrary finite domains", In proceedings of CT-RSA conference, LNCS Vol. 2271, pp. 114-130, Springer-Verlag, 2001.
-
(2001)
Proceedings of CT-RSA Conference
, vol.2271
, pp. 114-130
-
-
Black, J.1
Rogaway, P.2
-
17
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
LNCS Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password-authenticated key exchange using diffie-hellman", In proceedings of Eurocrypt'00, LNCS Vol. 1807, pp. 156-171, Springer-Verlag, 2000.
-
(2000)
Proceedings of Eurocrypt'00
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
18
-
-
84948991087
-
A secure and efficient conference key distribution system
-
LNCS Springer-Verlag
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system", In proc. of Eurocrypt'94 LNCS VOL. 950, pp. 275-286, Springer-Verlag, 1994.
-
(1994)
Proc. of Eurocrypt'94
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
19
-
-
84944063128
-
Password-authenticated key exchange between clients with different passwords
-
LNCS Springer-Verlag
-
J. Byun, I. Jeong, D. Lee, and C. Park, "Password-authenticated key exchange between clients with different passwords", In proceedings of ICICS'02, LNCS Vol. 2513, pp. 134-146, Springer-Verlag, 2002.
-
(2002)
Proceedings of ICICS'02
, vol.2513
, pp. 134-146
-
-
Byun, J.1
Jeong, I.2
Lee, D.3
Park, C.4
-
22
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning and G. Sacco, "Timestamps in key distribution protocols", In Communications of the ACM, Vol. 24, No. 8, pp. 533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
23
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster, "Undetectable on-line password guessing attacks", In ACM Operating Systems Review, Vol. 29, No. 4, pp. 77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
24
-
-
84880888233
-
Session-key generation using human passwords only
-
LNCS Springer-Verlag
-
O. Goldreich and Y. Lindell, "Session-key generation using human passwords only", In proceedings of Crypto'01, LNCS Vol. 2139, pp. 408-432, Springer-Verlag, 2001.
-
(2001)
Proceedings of Crypto'01
, vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
27
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, "Strong password-only authenticated key exchange", In Computer Communication Review, Vol.26, No.5, pp. 5-26, 1996.
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
28
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
LNCS Springer-Verlag
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient password- authenticated key exchange using human-memorable passwords", In proceedings of Eurocrypt'01, LNCS Vol. 2045, pp. 475-494, Springer-Verlag, 2001.
-
(2001)
Proceedings of Eurocrypt'01
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
30
-
-
35048854202
-
Cryptanalysis and improvements of password authenticated key exchange scheme between clients with different passwords
-
LNCS Springer-Verlag
-
J. Kim, S. Kim, J. Kwak, and D. Won, "Cryptanalysis and Improvements of Password Authenticated Key Exchange Scheme between Clients with Different Passwords", In Proceedings of ICCSA 2004, LNCS Vol. 3044, pp. 895-902, Springer-Verlag, 2004.
-
(2004)
Proceedings of ICCSA 2004
, vol.3044
, pp. 895-902
-
-
Kim, J.1
Kim, S.2
Kwak, J.3
Won, D.4
-
32
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution", In ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
33
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
IEEE Press
-
G. Lin, H. Sun, M. Steiner, and Tzonelih Hwang, "Three-party Encrypted Key Exchange Without Server Public-Keys", In IEEE Communications Letters, Vol. 5, No. 12, pp. 497-499, IEEE Press, 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, G.1
Sun, H.2
Steiner, M.3
Hwang, T.4
-
34
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encryting public keys
-
S. Lucks, "Open key exchange: how to defeat dictionary attacks without encryting public keys", In proceedings of the security protocol workshop '97, pp. 79-90, 1997.
-
(1997)
Proceedings of the Security Protocol Workshop '97
, pp. 79-90
-
-
Lucks, S.1
-
35
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waider, "Refinement and extension of encrypted key exchange", In ACM Operation Sys. Review, Vol. 29, No. 3, pp. 22-30, 1995.
-
(1995)
ACM Operation Sys. Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waider, M.3
-
36
-
-
0029720059
-
Diffie-hellman key distribution extended to groups
-
ACM Press
-
M. Steiner, G. Tsudik, and M, Waidner, "Diffie-hellman key distribution extended to groups", In proceedings of ACM CCS'96, ACM Press, 1996.
-
(1996)
Proceedings of ACM CCS'96
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
37
-
-
84880904783
-
OAEP reconsidered
-
LNCS
-
V. Shoup, "OAEP reconsidered", In proceedings of Crypto01', LNCS Vol. 2139, pp. 239-259, 2001.
-
(2001)
Proceedings of Crypto01'
, vol.2139
, pp. 239-259
-
-
Shoup, V.1
-
38
-
-
0036538428
-
A secure fault-tolerant conference-key agreement protocol
-
W. Tzeng, "A secure fault-tolerant conference-key agreement protocol", In IEEE Transaction on Computers, Vol. 51, No. 4, 2002.
-
(2002)
IEEE Transaction on Computers
, vol.51
, Issue.4
-
-
Tzeng, W.1
-
39
-
-
84947922642
-
On the design of security protocols for mobile communications
-
LNCS
-
V. Varadharajan and Y. Mu, "On the design of security protocols for mobile communications", In proceedings of ACISP'96, LNCS Vol. 1172, pp. 134-145, 1996.
-
(1996)
Proceedings of ACISP'96
, vol.1172
, pp. 134-145
-
-
Varadharajan, V.1
Mu, Y.2
-
40
-
-
35048872322
-
Weakness of a password-authenticated key exchange protocol between clients with different passwords
-
LNCS Springer-Verlag
-
S. Wang, J. Wang, and M. Xu, "Weakness of a Password-authenticated Key Exchange Protocol Between Clients with Different Passwords", In Proceedings of ACNS 2004, LNCS Vol. 3089, pp. 414-425, Springer-Verlag, 2004.
-
(2004)
Proceedings of ACNS 2004
, vol.3089
, pp. 414-425
-
-
Wang, S.1
Wang, J.2
Xu, M.3
|