-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. Adv. in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 139-155, 2000.
-
(2000)
Adv. in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
LNCS, Springer-Verlag
-
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Adv. in Cryptology - Crypto 1993, LNCS vol. 773, Springer-Verlag, pp. 232-249, 1994.
-
(1994)
Adv. in Cryptology - Crypto 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE
-
S.M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. IEEE Symposium on Research in Security and Privacy, IEEE, pp. 72-84, 1992.
-
(1992)
IEEE Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
ACM
-
S.M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise. 1st ACM Conf. on Computer and Comm. Security, ACM, pp. 244-250, 1993.
-
(1993)
1st ACM Conf. on Computer and Comm. Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
7
-
-
0033280383
-
Public-key cryptography and password protocols: The multi-user case
-
ACM
-
M. Boyarsky. Public-Key Cryptography and Password Protocols: The Multi-User Case. 7th Ann. Conf. on Computer and Comm. Security, ACM, pp. 63-72, 1999.
-
(1999)
7th Ann. Conf. on Computer and Comm. Security
, pp. 63-72
-
-
Boyarsky, M.1
-
8
-
-
84937550984
-
Provably-secure password-authenticated key exchange using Diffie-Hellman
-
LNCS, Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel. Provably-Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Adv. in Cryptology - Eurocrypt 2000, LNCS vol. 1807, Springer-Verlag, pp. 156-171, 2000.
-
(2000)
Adv. in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
9
-
-
33646717563
-
Nightingale: A new two-server approach for authentication with short secrets
-
J. Brainard, A. Juels, B. Kaliski, and M. Szydlo. Nightingale: A New Two-Server Approach for Authentication with Short Secrets. 12th USENIX Security Symp., pp. 201-213, 2003.
-
(2003)
12th USENIX Security Symp.
, pp. 201-213
-
-
Brainard, J.1
Juels, A.2
Kaliski, B.3
Szydlo, M.4
-
10
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The Random Oracle Methodology, Revisited. J. ACM 51(4): 557-594, 2004.
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
11
-
-
24944498271
-
Universally-composable password authenticated key exchange
-
to appear
-
R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. MacKenzie. Universally-Composable Password Authenticated Key Exchange. Eurocrypt 2005, to appear.
-
Eurocrypt 2005
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
13
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
LNCS, Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols. Adv. in Cryptology - Crypto 1994, LNCS vol. 839, Springer-Verlag, pp. 174-187, 1994.
-
(1994)
Adv. in Cryptology - Crypto 1994
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
14
-
-
84870707379
-
A practical public key cryptosystem provably secure against chosen ciphertext attack
-
LNCS, Springer-Verlag
-
R. Cramer and V. Shoup. A Practical Public Key Cryptosystem Provably Secure Against Chosen Ciphertext Attack. Adv. in Cryptology - Crypto 1998, LNCS vol. 1462, Springer-Verlag, pp. 13-25, 1998.
-
(1998)
Adv. in Cryptology - Crypto 1998
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
35248822669
-
Provably secure threshold password-authenticated key exchange
-
LNCS, Springer-Verlag
-
M. Di Raimondo and R. Gennaro. Provably Secure Threshold Password-Authenticated Key Exchange. Adv. in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 507-523, 2003.
-
(2003)
Adv. in Cryptology - Eurocrypt 2003
, vol.2656
, pp. 507-523
-
-
Di Raimondo, M.1
Gennaro, R.2
-
18
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory 31: 469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
20
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
LNCS, Springer-Verlag
-
R. Gennaro and Y. Lindell. A Framework for Password-Based Authenticated Key Exchange. Adv. in Cryptology - Eurocrypt 2003, LNCS vol. 2656, Springer-Verlag, pp. 524-543, 2003.
-
(2003)
Adv. in Cryptology - Eurocrypt 2003
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
21
-
-
84957104180
-
Two-party RSA key generation
-
LNCS, Springer-Verlag
-
N. Gilboa. Two-Party RSA Key Generation. Adv. in Cryptology - Crypto 1999, LNCS vol. 1666, Springer-Verlag, pp. 116-129, 1999.
-
(1999)
Adv. in Cryptology - Crypto 1999
, vol.1666
, pp. 116-129
-
-
Gilboa, N.1
-
22
-
-
84880888233
-
Session-key generation using human passwords only
-
LNCS, Springer-Verlag
-
O. Goldreich and Y. Lindell. Session-Key Generation Using Human Passwords Only. Adv. in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 408-432, 2001.
-
(2001)
Adv. in Cryptology - Crypto 2001
, vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
23
-
-
0027615231
-
Protecting poorly-chosen secrets from guessing attacks
-
L. Gong, T.M.A. Lomas, R.M. Needham, and J.H. Saltzer. Protecting Poorly-Chosen Secrets from Guessing Attacks. IEEE J. on Selected Areas in Communications 11(5): 648-656, 1993.
-
(1993)
IEEE J. on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
25
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon. Strong Password-Only Authenticated Key Exchange. ACM Computer Communications Review 26(5): 5-20, 1996.
-
(1996)
ACM Computer Communications Review
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
26
-
-
84937539386
-
Password authentication using multiple servers
-
LNCS, Springer-Verlag
-
D. Jablon. Password Authentication Using Multiple Servers. RSA Cryptographers' Track 2001, LNCS vol. 2020, Springer-Verlag, pp. 344-360, 2001.
-
(2001)
RSA Cryptographers' Track 2001
, vol.2020
, pp. 344-360
-
-
Jablon, D.1
-
28
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
LNCS, Springer-Verlag
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Adv. in Cryptology - Eurocrypt 2001, LNCS vol. 2045, Springer-Verlag, pp. 475-494, 2001.
-
(2001)
Adv. in Cryptology - Eurocrypt 2001
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
29
-
-
0024940229
-
Reducing risks from poorly-chosen keys
-
T.M.A. Lomas, L. Gong, J.H. Saltzer, and R.M. Needham. Reducing Risks from Poorly-Chosen Keys. ACM Operating Systems Review 23(5): 14-18, 1989.
-
(1989)
ACM Operating Systems Review
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.M.A.1
Gong, L.2
Saltzer, J.H.3
Needham, R.M.4
-
30
-
-
84957025686
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
LNCS, Springer-Verlag
-
S. Lucks. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. Proc. of the Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp. 79-90, 1997.
-
(1997)
Proc. of the Security Protocols Workshop
, vol.1361
, pp. 79-90
-
-
Lucks, S.1
-
31
-
-
84937402236
-
Password-authenticated key exchange based on RSA
-
LNCS, Springer-Verlag
-
P. MacKenzie, S. Patel, and R. Swaminathan. Password-Authenticated Key Exchange Based on RSA. Adv. in Cryptology - Asiacrypt 2000, LNCS 1976, Springer-Verlag, pp. 599-613, 2000.
-
(2000)
Adv. in Cryptology - Asiacrypt 2000
, vol.1976
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
32
-
-
26444507178
-
An efficient two-party public-key cryptosystem secure against adaptive chosen-ciphertext attack
-
LNCS, Springer-Verlag
-
P. MacKenzie. An Efficient Two-Party Public-Key Cryptosystem Secure against Adaptive Chosen-Ciphertext Attack. Public Key Cryptography (PKC) 2003, LNCS vol. 2567, Springer-Verlag, pp. 47-61, 2003.
-
(2003)
Public Key Cryptography (PKC) 2003
, vol.2567
, pp. 47-61
-
-
MacKenzie, P.1
-
34
-
-
84880864572
-
Two-party generation of DSA signatures
-
LNCS, Springer-Verlag
-
P. MacKenzie and M. Reiter. Two-Party Generation of DSA Signatures. Adv. in Cryptology - Crypto 2001, LNCS vol. 2139, Springer-Verlag, pp. 137-154, 2001.
-
(2001)
Adv. in Cryptology - Crypto 2001
, vol.2139
, pp. 137-154
-
-
MacKenzie, P.1
Reiter, M.2
-
35
-
-
84937438236
-
Threshold password-authenticated key exchange
-
LNCS, Springer-Verlag
-
P. MacKenzie, T. Shrimpton, and M. Jakobsson. Threshold Password-Authenticated Key Exchange. Adv. in Cryptology - Crypto 2002, LNCS vol. 2442, Springer-Verlag, pp. 385-400, 2002.
-
(2002)
Adv. in Cryptology - Crypto 2002
, vol.2442
, pp. 385-400
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
37
-
-
24144440891
-
Proofs for two-server password authentication
-
LNCS, Springer-Verlag
-
M. Szydlo and B. Kaliski. Proofs for Two-Server Password Authentication. RSA Cryptographers' Track 2005, LNCS vol. 3376, Springer-Verlag, pp. 227-244, 2005.
-
(2005)
RSA Cryptographers' Track 2005
, vol.3376
, pp. 227-244
-
-
Szydlo, M.1
Kaliski, B.2
|