-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology Eurocrypt'00, Springer-Verlag
-
Bellare, M., Pointcheaval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. Advances in Cryptology Eurocrypt'00, LNCS Vol. 1807. Springer-Verlag (2000) 139-155
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheaval, D.2
Rogaway, P.3
-
2
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attack
-
Bellovin, S. M., Merrit, M.: Encrypted key exchange: Password-based protocols secure against dictionary attack. In Proceedings of IEEE Security and Privacy (1992) 72-84
-
(1992)
Proceedings of IEEE Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
3
-
-
0033280383
-
Public key cryptography and password protocols: The multi-user case
-
Boyarsky, M.: Public key cryptography and password protocols: The multi-user case. In ACM Security (CCS'99) (1999) 63-72
-
(1999)
ACM Security (CCS'99)
, pp. 63-72
-
-
Boyarsky, M.1
-
4
-
-
84937550984
-
Probably secure password authenticated key exchange using Diffie-Hellman
-
Advances in Cryptology Eurocrypt'00, Springer-Verlag
-
Boyko, V., MacKenzie, P., Patal, S.: Probably secure password authenticated key exchange using Diffie-Hellman. Advances in Cryptology Eurocrypt'00, LNCS Vol. 1807. Springer-Verlag (2000) 156-171
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patal, S.3
-
6
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, Vol. IT-31, No. 4. (1985) 469-472
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
0003629991
-
FIPS 180-1: Secure hash standards
-
US Department Commerce/NIST, National Technical Information Service, Springfield, Virginia
-
FIPS 180-1: Secure hash standards. Federal Information Processing Standards Publication 180-1, US Department Commerce/NIST, National Technical Information Service, Springfield, Virginia (1995)
-
(1995)
Federal Information Processing Standards Publication 180-1
-
-
-
8
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong, L., Lomas, T. M. A., Needham, R. M., Saltzer, J. H.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5. (1993) 648-656
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
9
-
-
0032218224
-
Public key cryptography and password protocols
-
Halevi, S., Krawczyk, H.: Public key cryptography and password protocols. In ACM Security (CCS'98) (1998) 122-131
-
(1998)
ACM Security (CCS'98)
, pp. 122-131
-
-
Halevi, S.1
Krawczyk, H.2
-
10
-
-
0030261758
-
Strong password-only authenticated key exchange
-
ACM SIGCOMM
-
Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM, Vol. 26, No. 5. (1996) 5-20
-
(1996)
ACM Computer Communication Review
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
11
-
-
84945132563
-
Efficient password authenticated key exchange using human memorable passwords
-
Advances in Cryptology Eurocrypt'01, Springer-Verlag
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient password authenticated key exchange using human memorable passwords. Advances in Cryptology Eurocrypt'01, LNCS Vol. 2045. Springer-Verlag (2001) 475-494
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
12
-
-
0000112683
-
Eliptic curve cryptosystems
-
Koblitz, N.: Eliptic curve cryptosystems. Mathematics of Computation, Vol. 48, No. 177. (1987) 203-209
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
Lomas, T. M. A., Gong, L., Saltzer, J. H., Needham, R. M.: Reducing risks from poorly chosen keys. ACM Operating Systems Review, Vol. 23, No. 5. (1989) 14-18
-
(1989)
ACM Operating Systems Review
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.M.A.1
Gong, L.2
Saltzer, J.H.3
Needham, R.M.4
-
15
-
-
0003455038
-
-
UMI Research Press, Ann Arbor, Michigan
-
Merkle, R. C.: Secrecy, Authentication, and Public Key Systems. UMI Research Press, Ann Arbor, Michigan (1979)
-
(1979)
Secrecy, Authentication, and Public Key Systems
-
-
Merkle, R.C.1
-
16
-
-
0030648441
-
Number theoretic attacks on secure password schemes
-
Patal, S.: Number theoretic attacks on secure password schemes. In proceedings of IEEE Security and Privacy (1997) 236-247
-
(1997)
Proceedings of IEEE Security and Privacy
, pp. 236-247
-
-
Patal, S.1
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol. 21, No. 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
|