-
1
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, Crypto'93, pages 232-249, 1993.
-
(1993)
Crypto'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
M. Bellare D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure Against Dictionary Attacks, Eurocrypt 2000, pages 139-155, 2000.
-
(2000)
Eurocrypt 2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0026850091
-
Encrypted Key Exchange: Password-based protocols secure against dictionary attacks
-
S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based protocols secure against dictionary attacks, Proceedings of IEEE Security and Privacy, pages 72-84, 1992.
-
(1992)
Proceedings of IEEE Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
4
-
-
84937550984
-
Provably secure password authenticated key exchange using Diffie-Helman
-
V. Boyko, P. MacKenzie, and S. Patel, Provably secure password authenticated key exchange using Diffie-Helman, Eurocrypt 2000, pages 156-171, 2000.
-
(2000)
Eurocrypt 2000
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
5
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning and G. Sacco, Timestamps in key distribution protocols, Communications of the ACM, vol 24, no 8, pages 533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
6
-
-
0033879372
-
Complexity and fast algorithms for multi-exponentiations
-
V. S. Dimitrov, G. A. Jullien, and W. C. Miller, Complexity and fast algorithms for multi-exponentiations, IEEE Transactions on Computers, vol 49, no 2, pages 141-147, 2000.
-
(2000)
IEEE Transactions on Computers
, vol.49
, Issue.2
, pp. 141-147
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
7
-
-
0013443819
-
Extended password key exchange protocols immune to dictionary attack
-
D. Jablon, Extended password key exchange protocols immune to dictionary attack, In WETICE'97 Workshop on Enterprise Security, 1997.
-
(1997)
WETICE'97 Workshop on Enterprise Security
-
-
Jablon, D.1
-
8
-
-
63449084114
-
-
K. Kobara and H. Imai, Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions, Cryptology ePrint Archive, Report 2003/038, 2003.
-
K. Kobara and H. Imai, Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions, Cryptology ePrint Archive, Report 2003/038, 2003.
-
-
-
-
9
-
-
85180777204
-
Authentication and key agreement via memorable password
-
T. Kwon, Authentication and key agreement via memorable password, Proceedings of the ISOC NDSS Symposium, 2001.
-
(2001)
Proceedings of the ISOC NDSS Symposium
-
-
Kwon, T.1
-
10
-
-
84937579448
-
More efficient password-authenticated key exchange
-
P. MacKenzie, More efficient password-authenticated key exchange, Progress in Cryptology - CT-RSA 2001, pages 361-377, 2001.
-
(2001)
Progress in Cryptology - CT-RSA 2001
, pp. 361-377
-
-
MacKenzie, P.1
-
13
-
-
1842499869
-
On Diffie-Hellman key agreement with short exponents
-
P. van Oorschot and M. Wiener, On Diffie-Hellman key agreement with short exponents, Eurocrypt'96, pages 332-343, 1994.
-
(1994)
Eurocrypt'96
, pp. 332-343
-
-
van Oorschot, P.1
Wiener, M.2
-
14
-
-
84957794888
-
Forward Secrecy and Its Application to Futher Mobile Communications Security
-
D. G. Park, C. Boyd, and S. J. Moon, Forward Secrecy and Its Application to Futher Mobile Communications Security, Public Key Cryptography, PKC 2000, pages 433-445, 2000.
-
(2000)
Public Key Cryptography, PKC 2000
, pp. 433-445
-
-
Park, D.G.1
Boyd, C.2
Moon, S.J.3
-
15
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig and M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Transactions on Information Theory, vol 24, no 1, pages 106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
16
-
-
84966238549
-
Monte Carlo methods for index computation mod p
-
J. Pollard, Monte Carlo methods for index computation mod p, Math, of computation, pages 918-924, 1978.
-
(1978)
Math, of computation
, pp. 918-924
-
-
Pollard, J.1
-
17
-
-
3042666549
-
On formal models for secure key exchange,
-
3120, April
-
V. Shoup, On formal models for secure key exchange, IBM Research Report RZ 3120, April, 1999.
-
(1999)
IBM Research Report RZ
-
-
Shoup, V.1
-
19
-
-
0028549045
-
Multi-exponentiation (cryptographic protocols)
-
S. M. Yen, C. S. Laih, and A. K. Lenstra, Multi-exponentiation (cryptographic protocols), Computers and Digital Techniques, IEEE Proceedings, vol 141, no 6, pages 325-326, 1994.
-
(1994)
Computers and Digital Techniques, IEEE Proceedings
, vol.141
, Issue.6
, pp. 325-326
-
-
Yen, S.M.1
Laih, C.S.2
Lenstra, A.K.3
|