-
1
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
LNCS Springer-Verlag
-
M. Abdalla, P. Fouque, and D. Pointcheval, "Password-Based Authenticated Key Exchange in the Three-Party Setting", In Proceedings of PKC 2005, LNCS Vol. 3386, pp. 65-84, Springer-Verlag, 2005.
-
(2005)
Proceedings of PKC 2005
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", In Proceedings of Eurocrypt'00, LNCS Vol.1807, pp. 139-155, Springer-Verlag, 2000.
-
(2000)
Proceedings of Eurocrypt'00
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0026850091
-
Encrypted key exchange: Password based protocols secure against dictionary attacks
-
IEEE
-
S. Bellovin and M. Merrit, "Encrypted key exchange: password based protocols secure against dictionary attacks", In Proceedings of the Symposium on Security and Privacy, pp.72-84, IEEE, 1992.
-
(1992)
Proceedings of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merrit, M.2
-
4
-
-
84958755223
-
Group diffie-hellman key exchange secure against dictionary attacks
-
LNCS, Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Group diffie-hellman key exchange secure against dictionary attacks", In Proceedings of Asiacrypt'02, LNCS Vol. 2501, pp. 497-514, Springer-Verlag, 2002.
-
(2002)
Proceedings of Asiacrypt'02
, vol.2501
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
5
-
-
84937550984
-
Provably secure password-authenticated key exchange using diffie-hellman
-
LNCS, Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password-authenticated key exchange using diffie-hellman", In Proceedings of Eurocrypt'00, LNCS Vol. 1807, pp. 156-171, Springer-Verlag, 2000
-
(2000)
Proceedings of Eurocrypt'00
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
6
-
-
84944063128
-
Password-authenticated key exchange between clients with different passwords
-
LNCS, Springer-Verlag
-
J. W. Byun, I. R. Jeong, D. H. Lee, and C. Park, "Password- authenticated key exchange between clients with different passwords", In Proceedings of ICICS'02, LNCS Vol. 2513, pp. 134-146, Springer-Verlag, 2002.
-
(2002)
Proceedings of ICICS'02
, vol.2513
, pp. 134-146
-
-
Byun, J.W.1
Jeong, I.R.2
Lee, D.H.3
Park, C.4
-
7
-
-
26444523527
-
N-party encrypted Diffie-Hellman key exchange using different passwords
-
LNCS, Springer-Verlag
-
J. W. Byun and D. H. Lee, "N-party Encrypted Diffie-Hellman Key Exchange Using Different Passwords", In Proc. of ACNS05', LNCS Vol. 3531, page 75-90, Springer-Verlag, 2005.
-
(2005)
Proc. of ACNS05'
, vol.3531
, pp. 75-90
-
-
Byun, J.W.1
Lee, D.H.2
-
8
-
-
33646835237
-
Password-based group key exchange secure against insider guessing attacks
-
LNAI, Springer-Verlag
-
J. W. Byun, D. H. Lee, and J. Lim "Password-Based Group Key Exchange Secure Against Insider Guessing Attacks", In Proc. of CIS 05', LNAI Vol. 3802, page 143-148, Springer-Verlag, 2005.
-
(2005)
Proc. of CIS 05'
, vol.3802
, pp. 143-148
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
-
11
-
-
84945132563
-
Efficient password-authenticated key exchange using uuman-memorable passwords
-
LNCS, Springer-Verlag
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient password- authenticated key exchange using uuman-memorable passwords", In Proceedings of Eurocrypt'01, LNCS Vol. 2045, pp. 475-494, Springer-Verlag, 2001.
-
(2001)
Proceedings of Eurocrypt'01
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
12
-
-
35048854202
-
Cryptoanalysis and improvements of password authenticated key exchange scheme between clients with different passwords
-
LNCS, Springer-Verlag
-
J. Kim, S. Kim, J. Kwak, and D. Won, "Cryptoanalysis and improvements of password authenticated key exchange scheme between clients with different passwords", In Proceedings of ICCSA 2004, LNCS Vol. 3044, pp. 895-902, Springer-Verlag, 2004.
-
(2004)
Proceedings of ICCSA 2004
, vol.3044
, pp. 895-902
-
-
Kim, J.1
Kim, S.2
Kwak, J.3
Won, D.4
-
13
-
-
33745352074
-
Secure password pocket for distributed web services
-
LNCS, Springer-Verlag
-
J. H. Koo and D. H. Lee, "Secure Password Pocket for Distributed Web Services", In Proc. of NPC 2005, LNCS Vol. 3779, pp. 327-334, Springer-Verlag, 2005.
-
(2005)
Proc. of NPC 2005
, vol.3779
, pp. 327-334
-
-
Koo, J.H.1
Lee, D.H.2
-
14
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution", ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
15
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
IEEE Press
-
C. Lin, H. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key exchange without server public-keys", IEEE Communications Letters, Vol. 5, No. 12, pp. 497-499, IEEE Press, 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.1
Sun, H.2
Steiner, M.3
Hwang, T.4
-
16
-
-
26444613363
-
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
-
LNCS Springer-Verlag
-
R. C.-W. Phan and B. Goi, "Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme", In Proceedings of ACNS 2005, LNCS Vol. 3531, pp. 33-39, Springer-Verlag, 2005.
-
(2005)
Proceedings of ACNS 2005
, vol.3531
, pp. 33-39
-
-
Phan, R.C.-W.1
Goi, B.2
-
17
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waider, "Refinement and extension of encrypted key exchange", In ACM Operation Sys. Review, Vol. 29, No. 3, pp. 22-30, 1995.
-
(1995)
ACM Operation Sys. Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waider, M.3
-
18
-
-
35048872322
-
Weakness of a password-authenticated key exchange protocol between clients with different passwords
-
LNCS Springer-Verlag
-
S. Wang, J. Wang, and M. Xu, "Weakness of a password-authenticated key exchange protocol between clients with different passwords", In Proceedings of ACNS 2004, LNCS Vol. 3089, pp. 414-425, Springer-Verlag, 2004.
-
(2004)
Proceedings of ACNS 2004
, vol.3089
, pp. 414-425
-
-
Wang, S.1
Wang, J.2
Xu, M.3
|