-
1
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Security Proofs for an Efficient Password-Based Key Exchange," Proc. ACM Conf. Computer and Comm. Security, pp. 241-250, 2003.
-
(2003)
Proc. ACM Conf. Computer and Comm. Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
3
-
-
33646717563
-
A new two-server approach for authentication with short secrets
-
J. Brainard, A. Juels, B. Kaliski, and M. Szydlo, "A New Two-Server Approach for Authentication with Short Secrets," Proc. USENIX Security Symp., 2003.
-
(2003)
Proc. USENIX Security Symp.
-
-
Brainard, J.1
Juels, A.2
Kaliski, B.3
Szydlo, M.4
-
4
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
S. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks," Proc. IEEE Symp. Research in Security and Privacy, pp. 72-84, 1992.
-
(1992)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
5
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. Bellovin and M. Merritt, "Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise," Proc. ACM Conf. Computer and Comm. Security, pp. 244-250, 1993.
-
(1993)
Proc. ACM Conf. Computer and Comm. Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
6
-
-
0033280383
-
Public-key cryptography and password protocols: The multi-user case
-
M.K. Boyarsky, "Public-Key Cryptography and Password Protocols: The Multi-User Case," Proc. ACM Conf. Computer and Comm. Security, pp. 63-72, 1999.
-
(1999)
Proc. ACM Conf. Computer and Comm. Security
, pp. 63-72
-
-
Boyarsky, M.K.1
-
7
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated Key Exchange Secure Against Dictionary Attacks," Advances in Cryptology (Eurocrypt '00), pp. 139-155, 2000.
-
(2000)
Advances in Cryptology (Eurocrypt '00)
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
8
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Computer and Comm. Security, pp. 62-73, 1993.
-
(1993)
Proc. ACM Computer and Comm. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
0033879372
-
Complexity and fast algorithms for multi-exponentiations
-
V.S. Dimitrov, G.A. Jullien, and W.C. Miller, "Complexity and Fast Algorithms for Multi-Exponentiations," IEEE Trans. Computers, vol. 49, no. 2, pp. 141-147, 2000.
-
(2000)
IEEE Trans. Computers
, vol.49
, Issue.2
, pp. 141-147
-
-
Dimitrov, V.S.1
Jullien, G.A.2
Miller, W.C.3
-
11
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, "Protecting Poorly Chosen Secrets from Guessing Attacks," IEEE J. Selected Areas in Comm., vol. 11, no. 5, pp. 648-656, 1993.
-
(1993)
IEEE J. Selected Areas in Comm.
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
14
-
-
84937539386
-
Password authentication using multiple servers
-
D.P. Jablon, "Password Authentication Using Multiple Servers," RSA Security Conf., pp. 344-360, 2001.
-
(2001)
RSA Security Conf.
, pp. 344-360
-
-
Jablon, D.P.1
-
16
-
-
0040231044
-
Foiling the cracker-a survey of, and improvements to, password security
-
D.V. Klein, "Foiling the Cracker-A Survey of, and Improvements to, Password Security," Proc. Second USENIX Security Symp., pp. 5-14, 1990.
-
(1990)
Proc. Second USENIX Security Symp.
, pp. 5-14
-
-
Klein, D.V.1
-
17
-
-
26444562427
-
Two server password-only authentication key exchange
-
J. Katz, P.D. Mackenzie, G. Taban, and V.D. Gligor, "Two Server Password-Only Authentication Key Exchange," Applied Cryptography and Network Security, pp. 1-16, 2005.
-
(2005)
Applied Cryptography and Network Security
, pp. 1-16
-
-
Katz, J.1
Mackenzie, P.D.2
Taban, G.3
Gligor, V.D.4
-
19
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient Password- Authenticated Key Exchange Using Human-Memorable Passwords," Proc. Advances in Cryptology (Eurocrypt '01), pp. 475-494, 2001.
-
(2001)
Proc. Advances in Cryptology (Eurocrypt '01)
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
21
-
-
84937438236
-
Threshold password-authenticated key exchange
-
P. Mackenzie, T. Shrimpton, and M. Jakobsson, "Threshold Password-Authenticated Key Exchange," Proc. Advances in Cryptology (Eurocrypt '02), pp. 385-400, 2002.
-
(2002)
Proc. Advances in Cryptology (Eurocrypt '02)
, pp. 385-400
-
-
Mackenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
|