-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology Eurocrypt'00, Springer-Verlag
-
Bellare, M., Pointcheaval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. Advances in Cryptology Eurocrypt'00, LNCS Vol. 1807. Springer-Verlag (2000) 139-155
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheaval, D.2
Rogaway, P.3
-
2
-
-
0027741529
-
Augmented encrypted key exchange: Password-based protocol secure against dictionary attack and password file compromise
-
Bellovin, S. M., Merrit, M.: Augmented encrypted key exchange: Password-based protocol secure against dictionary attack and password file compromise. In ACM Security (CCS'93) (1993) 244-250
-
(1993)
ACM Security (CCS'93)
, pp. 244-250
-
-
Bellovin, S.M.1
Merrit, M.2
-
3
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attack
-
Bellovin, S. M., Merrit, M.: Encrypted key exchange: Password-based protocols secure against dictionary attack. In Proceedings of IEEE Security and Privacy (1992) 72-84
-
(1992)
Proceedings of IEEE Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
4
-
-
84937550984
-
Provably secure password authenticated key exchange using Diffie-Hellman
-
Advances in Cryptology Eurocrypt'00, Springer-Verlag
-
Boyko, V., MacKenzie, Patal, P. S.: Provably secure password authenticated key exchange using Diffie-Hellman. Advances in Cryptology Eurocrypt'00, LNCS Vol. 1807. Springer-Verlag (2000) 156-171
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie2
Patal, P.S.3
-
5
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
Gong, L.: Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop (1995) 24-29
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
6
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong, L., Lomas, T. M. A., Needham, R. M, Saltzer, J. H.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5) (1993) 648-656
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
7
-
-
0032218224
-
Public-key cryptography and password protocols
-
Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. ACM Security (CCS'98) (1998) 122-131
-
(1998)
ACM Security (CCS'98)
, pp. 122-131
-
-
Halevi, S.1
Krawczyk, H.2
-
9
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM, Vol. 26, No. 5 (1996) 5-20
-
(1996)
ACM Computer Communication Review, ACM SIGCOMM
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
10
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM, Vol. 24 (1981) 770-772
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
12
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol. 21, No. 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|