-
2
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proc. EUROCRYPT '00, Springer
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. EUROCRYPT '00, volume 1807 of LNCS, pages 139-155. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE Computer Society
-
S. Bellovin and M. Merritt. Encrypted key exchange: password-based protocols secure against dictionary attacks. In Proc. IEEE Security and Privacy Symposium, pages 72-84. IEEE Computer Society, 1992.
-
(1992)
Proc. IEEE Security and Privacy Symposium
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
6
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-hellman
-
Proc. EUROCRYPT '00, Springer
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proc. EUROCRYPT '00, volume 1807 of LNCS, pages 156-171. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
10
-
-
0003532271
-
UNIX password security - Ten years later
-
Springer Proc. CRYPTO '89
-
D. C. Feldmeier and P. R. Karn. UNIX password security - ten years later. In Proc. CRYPTO '89, volume 435 of LNCS, pages 44-63. Springer, 1989.
-
(1989)
LNCS
, vol.435
, pp. 44-63
-
-
Feldmeier, D.C.1
Karn, P.R.2
-
11
-
-
33646849366
-
Rigorous time/space tradeoffs for inverting functions
-
ACM
-
A. Fiat and M. Naor. Rigorous time/space tradeoffs for inverting functions. In Proc. STOC '91, pages 534-541. ACM, 1991.
-
(1991)
Proc. STOC '91
, pp. 534-541
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
0015600423
-
The Viterbi algorithm
-
G. D. Forney. The Viterbi algorithm. Proceedings of the IEEE, 61(3):268-278, 1973.
-
(1973)
Proceedings of the IEEE
, vol.61
, Issue.3
, pp. 268-278
-
-
Forney, G.D.1
-
13
-
-
33745793866
-
Password authenticated key exchange using hidden smooth subgroups
-
C. Gentry, P. MacKenzie, and Z. Ramzan. Password authenticated key exchange using hidden smooth subgroups. In these proceedings, 2005.
-
(2005)
These Proceedings
-
-
Gentry, C.1
MacKenzie, P.2
Ramzan, Z.3
-
14
-
-
84880888233
-
Session-key generation using human random passwords
-
Proc. CRYPTO '01, Springer
-
O. Goldreich and Y. Lindell. Session-key generation using human random passwords. In Proc. CRYPTO '01, volume 2139 of LNCS, pages 408-432. Springer, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
18
-
-
85084161999
-
The design and analysis of graphical passwords
-
USENIX
-
I. Jermyn, A. Mayer, F. Monrose, M. Reiter, and A. Rubin. The design and analysis of graphical passwords. In Proc. 8th USENIX Security Symposium, pages 135-150. USENIX, 1999.
-
(1999)
Proc. 8th USENIX Security Symposium
, pp. 135-150
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.4
Rubin, A.5
-
19
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
Proc. EUROCRYPT '01, Springer
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proc. EUROCRYPT '01, volume 2045 of LNCS, pages 475-494. Springer, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
20
-
-
84858929210
-
-
The Washington Post, March 28
-
B. Kerbs. DNA key to decoding human factor. The Washington Post, March 28, 2005. http://www.washingtonpost.com/wp-dyn/articles/A6098-2005Mar28.html.
-
(2005)
DNA Key to Decoding Human Factor
-
-
Kerbs, B.1
-
21
-
-
0029733777
-
Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32 and Skipjack
-
K. Kusuda and T. Matsumoto. Optimization of time-memory trade-off cryptanalysis and its application to DES, FEAL-32 and Skipjack. IEICE Transactions on Fundamentals, E79-A(1):35-48, 1996.
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.1
, pp. 35-48
-
-
Kusuda, K.1
Matsumoto, T.2
-
24
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
Proc. Security Protocols Workshop, Springer
-
S. Lucks. Open key exchange: how to defeat dictionary attacks without encrypting public keys. In Proc. Security Protocols Workshop, volume 1361 of LNCS. Springer, 1997.
-
(1997)
LNCS
, vol.1361
-
-
Lucks, S.1
-
25
-
-
39749093168
-
The magical number seven, plus or minus two; Some limits on our capacity for processing information
-
G. A. Miller. The magical number seven, plus or minus two; Some limits on our capacity for processing information. Psychological Review, 63:81-97, 1956.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
26
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. Reiter, and S. Wetzel. Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2):69-93, 2002.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 69-93
-
-
Monrose, F.1
Reiter, M.2
Wetzel, S.3
-
27
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thomson. Password security: A case history. In Communications of the ACM, Vol.22, No. 11, pages 594-597, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thomson, K.2
-
28
-
-
35248858454
-
Making a faster cryptanalytic time-memory trade-off
-
Proc. CRYPTO '03, Springer
-
P. Oechslin. Making a faster cryptanalytic time-memory trade-off. In Proc. CRYPTO '03, volume 2729 of LNCS, pages 617-630. Springer, 2003.
-
(2003)
LNCS
, vol.2729
, pp. 617-630
-
-
Oechslin, P.1
-
30
-
-
84858918050
-
-
Openwall Project. Wordlists collection. http://www.openwall.com/wordlists/, 2005.
-
(2005)
Wordlists Collection
-
-
-
32
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
34
-
-
21644485720
-
A time/memory tradeoff using distinguished points: New analysis and FPGA results
-
Proc. CHES 2002, Springer
-
F. Standaert, G. Rouvroy, J.J. Quisquater, and J. Legat. A time/memory tradeoff using distinguished points: new analysis and FPGA results. In Proc. CHES 2002, volume 2523 of LNCS, pages 593-609. Springer, 2002.
-
(2002)
LNCS
, vol.2523
, pp. 593-609
-
-
Standaert, F.1
Rouvroy, G.2
Quisquater, J.J.3
Legat, J.4
-
35
-
-
35048814173
-
Addressing online dictionary attacks with login histories and humans-in-the-loop
-
Proc. Financial Cryptography, Springer
-
S. Stubblebine and P. van Oorschot. Addressing online dictionary attacks with login histories and humans-in-the-loop. In Proc. Financial Cryptography, volume 3110 of LNCS, pages 39-53. Springer, 2004.
-
(2004)
LNCS
, vol.3110
, pp. 39-53
-
-
Stubblebine, S.1
Van Oorschot, P.2
-
36
-
-
85084163855
-
Graphical dictionary and the memorable space of graphical passwords
-
USENIX
-
J. Thorpe and P. van Oorschot. Graphical dictionary and the memorable space of graphical passwords. In Proc. 13th USENIX Security Symposium, pages 135-150. USENIX, 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
, pp. 135-150
-
-
Thorpe, J.1
Van Oorschot, P.2
|