-
1
-
-
84946837370
-
Key-privacy in public-key encryption
-
Asiancrypt '01 Springer, Berlin
-
M. Bellare, A. Boldyreva, A. Desai, D. Pointcheval, Key-privacy in public-key encryption, in: Asiancrypt '01, Lecture Notes in Computer Science, Vol. 2248, Springer, Berlin, 2001, pp. 566-582.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 566-582
-
-
Bellare, M.1
Boldyreva, A.2
Desai, A.3
Pointcheval, D.4
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology - Eurocrypt'2000 Springer, Berlin
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, Advances in Cryptology - Eurocrypt' 2000, Lecture Notes in Computer Science, Vol. 1807, Springer, Berlin, 2000, pp. 139-155.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
84944886613
-
Ciphers with arbitrary finite domains
-
J. Black, P. Rogaway, Ciphers with arbitrary finite domains, Proc. CT-RSA 2002, pp. 114-130.
-
Proc. CT-RSA 2002
, pp. 114-130
-
-
Black, J.1
Rogaway, P.2
-
6
-
-
84958760024
-
Elliptic curve based password authenticated key exchange protocols
-
ACISP '01 Springer, Berlin
-
C. Boyd, P. Montague, K. Nguyen, Elliptic curve based password authenticated key exchange protocols, in: ACISP '01, Lecture Notes in Computer Science, Vol. 2119, Springer, Berlin, 2001, pp. 487-501.
-
(2001)
Lecture Notes in Computer Science
, vol.2119
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
7
-
-
84937550984
-
Provable secure password authenticated key exchange using Diffie-Hellman
-
Advances in Cryptology - Eurocrypt'2000 Springer, Berlin
-
V. Boyko, P. MacKenzie, S. Patel, Provable secure password authenticated key exchange using Diffie-Hellman, Advances in Cryptology - Eurocrypt' 2000, Lecture Notes in Computer Science, Vol. 1807, Springer, Berlin, 2000, pp. 156-171.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
8
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, Security proofs for an efficient password-based key exchange, Proc. 10th ACM Conf. on Computer and Communications Security, 2003, pp. 241-250.
-
(2003)
Proc. 10th ACM Conf. on Computer and Communications Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
47349130323
-
Secure password-based cipher suite for TLS
-
February
-
P. Buhler, T. Eirich, M. Steiner, M. Waidner, Secure password-based cipher suite for TLS, Proc. Network and Distributed Systems Security Symposium, February, 2000.
-
(2000)
Proc. Network and Distributed Systems Security Symposium
-
-
Buhler, P.1
Eirich, T.2
Steiner, M.3
Waidner, M.4
-
10
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer Protecting poorly chosen secrets from guessing attacks IEEE J. Selected Areas Comm. 11 5 1993 648 656
-
(1993)
IEEE J. Selected Areas Comm.
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
12
-
-
32644436941
-
-
IEEE P1363.2
-
IEEE P1363.2 〈 http://grouper.ieee.org/groups/1363/passwdPK/ submissions.html 〉
-
-
-
-
13
-
-
0030261758
-
Strong password-only authentication key exchange
-
This is also a submission to IEEE P1363.2
-
D. Jablon Strong password-only authentication key exchange ACM Comput. Communications Rev. 26 5 1996 5 26 This is also a submission to IEEE P1363.2. Available from IEEE P1363.2 〈 http://grouper.ieee.org/groups/1363/passwdPK/ submissions.html 〉
-
(1996)
ACM Comput. Communications Rev.
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
14
-
-
32644435934
-
EC-SRP protocol: Elliptic curve secure remote password protocol
-
Y. Lee, and J.Lee. EC-SRP protocol: elliptic curve secure remote password protocol Korea Inst. Inform. Security Cryptol. 9 1 1999 85 102
-
(1999)
Korea Inst. Inform. Security Cryptol.
, vol.9
, Issue.1
, pp. 85-102
-
-
Lee, Y.1
Lee, J.2
-
15
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
Advances in Cryptology - Crypto'97 Springer, Berlin
-
C. Lim, P. Lee, A key recovery attack on discrete log-based schemes using a prime order subgroup, Advances in Cryptology - Crypto' 97, Lecture Notes in Computer Science, Vol. 1294, Springer, Berlin, 1997, pp. 249-263.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 49-263
-
-
Lim, C.1
Lee, P.2
-
16
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
Proc. Security Protocols Workshop Springer, Berlin
-
S. Lucks. Open key exchange: how to defeat dictionary attacks without encrypting public keys, Proc. Security Protocols Workshop, Lecture Notes in Computer Science, Vol. 1361, Springer, Berlin, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1361
-
-
Lucks, S.1
-
17
-
-
32644441717
-
Key agreement and the need for authentication
-
Toronto, Canada
-
A. Menezes, M. Qu, S. Vanstone, Key agreement and the need for authentication, Workshop records of PKS'95, Toronto, Canada.
-
Workshop Records of PKS'95
-
-
Menezes, A.1
Qu, M.2
Vanstone, S.3
-
19
-
-
0030648441
-
Number theoretic attacks on secure password schemes
-
IEEE Press, Silver Spring, MD
-
S. Patel, Number theoretic attacks on secure password schemes, in: Proc. IEEE Symp. on Security and Privacy, IEEE Press, Silver Spring, MD, 1997, pp. 236-247.
-
(1997)
Proc. IEEE Symp. on Security and Privacy
, pp. 236-247
-
-
Patel, S.1
-
20
-
-
32644433660
-
-
IETF Working Group
-
SACRED, Securely Available Credentials (sacred), IETF Working Group. More information is available from: 〈 http://www.ietf.org/html.charters/sacred- charter.html 〉
-
SACRED, Securely Available Credentials (Sacred)
-
-
-
21
-
-
85016441190
-
Secure password-based cipher suite for TLS
-
M. Steiner, P. Buhler, T. Eirich, and M. Waidner Secure password-based cipher suite for TLS ACM Trans. Inform. System Security 4 2 2001 134 157
-
(2001)
ACM Trans. Inform. System Security
, vol.4
, Issue.2
, pp. 134-157
-
-
Steiner, M.1
Buhler, P.2
Eirich, T.3
Waidner, M.4
-
23
-
-
1842499869
-
On Diffie-Hellman key agreement with short exponents
-
Advances in Cryptology - Eurocrypt'96
-
P. van Oorschot, M. Wiener, On Diffie-Hellman key agreement with short exponents, Advances in Cryptology - Eurocrypt' 96, Lecture Notes in Computer Science, Vol. 1070, Springer, Berlin, 1996, pp. 332-343.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 332-343
-
-
Van Oorschot, P.1
Wiener, M.2
-
24
-
-
32644438545
-
Elliptic curve based SRP protocol SRP5
-
Y. Wang. Elliptic curve based SRP protocol SRP5, IEEE P1363.2 standards. http://grouper.ieee.org/groups/1363/passwdPK/contributions.html
-
IEEE P1363.2 Standards
-
-
Wang, Y.1
|