-
1
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
LNCS 3386, Springer-Verlag
-
M. Abdalla, P.-A. Fouque, and D. Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. In Proc. PKC '05, LNCS 3386, pp. 65-84, Springer-Verlag, 2005.
-
(2005)
Proc. PKC '05
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
2
-
-
0034498689
-
Remarks on the unknown key-share attacks
-
J. Baek, and K. Kim. Remarks on the Unknown Key-share Attacks. In IEICE Transactions on Fundamentals, Vol. E83-A, No. 12, pp.2766-2769, 2000.
-
(2000)
IEICE Transactions on Fundamentals
, vol.E83-A
, Issue.12
, pp. 2766-2769
-
-
Baek, J.1
Kim, K.2
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS 1807, Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology - EUROCRYPT '00, LNCS 1807, pp. 139-155, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - EUROCRYPT '00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84941157067
-
Provably secure key distribution - The three party case
-
M. Bellare, and P. Rogaway. Provably Secure Key Distribution - the Three Party Case. In Proc. ACM-SToC '96, pp. 72-84, 1996.
-
(1996)
Proc. ACM-SToC '96
, pp. 72-84
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure Against dictionary attacks
-
IEEE Press
-
S.M. Bellovin, and M. Merritt. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In Proc. IEEE S&P '92, pp. 72-84, IEEE Press, 1992.
-
(1992)
Proc. IEEE S&P '92
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
84958755223
-
Group Diffie Hellman key exchange secure against dictionary attacks
-
LNCS 2501, Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie Hellman Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology - ASIACRYPT '02, LNCS 2501, pp. 497-514, Springer-Verlag, 2002.
-
(2002)
Advances in Cryptology - ASIACRYPT '02
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
7
-
-
26444523527
-
N-Party encrypted diffie-Hellman key exchange using different passwords
-
LNCS 3531, Springer-Verlag
-
J.W. Byun, and D.H. Lee. N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In Proc. ACNS '05, LNCS 3531, pp. 75-90, Springer-Verlag, 2005.
-
(2005)
Proc. ACNS '05
, pp. 75-90
-
-
Byun, J.W.1
Lee, D.H.2
-
8
-
-
70350129781
-
Comments on weaknesses in two group Diffie-Hellman key exchange protocols
-
J.W. Byun, and D.H. Lee. Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR ePrint Archive, 2005/209, 2005.
-
(2005)
IACR EPrint Archive
, vol.2005
, Issue.209
-
-
Byun, J.W.1
Lee, D.H.2
-
9
-
-
0242372124
-
Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party
-
LNCS 2846, Springer-Verlag
-
J.G. Choi, K. Sakurai, and J.H. Park. Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. In Proc. A CNS '03, LNCS 2846, pp. 265-279, Springer-Verlag, 2003.
-
(2003)
Proc. A CNS '03
, pp. 265-279
-
-
Choi, J.G.1
Sakurai, K.2
Park, J.H.3
-
10
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. In Design, Codes and Cryptography, Vol. 2, No. 2, pp.107-125, 1992.
-
(1992)
Design, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
11
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding, and P. Horster. Undetectable On-line Password Guessing Attacks. In ACM Operating Systems Review, Vol. 29, No. 4, pp.77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
12
-
-
0030676227
-
Fair exchange with a semi-trusted third party
-
M.K. Franklin, and M.K. Reiter. Fair Exchange with a Semi-trusted Third Party (Extended Abstract). In Proc. ACM-CCS '97, pp. 1-5, 1997.
-
(1997)
Proc. ACM-CCS '97
, pp. 1-5
-
-
Franklin, M.K.1
Reiter, M.K.2
-
13
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, Strong Password-only Authenticated Key Exchange. In ACM Computer Communications Review, Vol. 20, No. 5, pp.5-26, 1996.
-
(1996)
ACM Computer Communications Review
, vol.20
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
14
-
-
67649746889
-
An Unknown key-share attack on the MQV key agreement protocol
-
B.S. Kaliski, Jr. An Unknown Key-share Attack on the MQV Key Agreement Protocol. In ACM Transactions on Information and System Security, Vol. 4, No. 3, pp.275-288, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 275-288
-
-
Kaliski Jr., B.S.1
-
15
-
-
33745766832
-
Modeling insider attacks on group key-exchange protocols
-
J. Katz, and J.S. Shin. Modeling Insider Attacks on Group Key-Exchange Protocols. In Proc. ACM-CCS '05, pp. 180-189, 2005.
-
(2005)
Proc. ACM-CCS '05
, pp. 180-189
-
-
Katz, J.1
Shin, J.S.2
-
16
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C.-L. Lin, H.-M. Sun and T. Hwang. Three-Party Encrypted Key Exchange: Attacks and a Solution. In ACM Operating Systems Review, Vol. 34, No. 4, pp. 12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.-L.1
Sun, H.-M.2
Hwang, T.3
-
17
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
IEEE Press
-
C.-L. Lin, H.-M. Sun, M. Steiner and T. Hwang. Three-Party Encrypted Key Exchange Without Server Public-Keys. In IEEE Communication Letters, Vol. 5, No. 12, pp.497-499, IEEE Press, 2001.
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
18
-
-
56049092580
-
Efficient identity-based conference key distribution protocols
-
LNCS 1438, Springer-Verlag
-
S. Saeednia, and R. Safavi-Naini. Efficient Identity-based Conference Key Distribution Protocols. In Proc. ACISP '98, LNCS 1438, pp. 320-331, Springer-Verlag, 1998.
-
(1998)
Proc. ACISP '98
, pp. 320-331
-
-
Saeednia, S.1
Safavi-Naini, R.2
-
19
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Elsevier
-
V. Shmatikov, arid J.C. Mitchell. Finite-state Analysis of Two Contract Signing Protocols. In Theoretical Computer Science, Vol. 283, No. 2, pp.419-450, Elsevier, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
20
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waider. Refinement and Extension of Encrypted Key Exchange. In ACM Operating Systems Review, Vol. 29, No. 3, pp.22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waider, M.3
-
21
-
-
33646850611
-
Weaknesses in two group Diffie-Hellman key exchange protocols
-
Q. Tang, and L. Chen. Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. IACR ePrint Archive, 2005/197, 2005.
-
(2005)
IACR EPrint Archive
, vol.2005
, Issue.197
-
-
Tang, Q.1
Chen, L.2
-
22
-
-
35248832186
-
Validating digital signatures without TTP's time-stamping and certificate revocation
-
LNCS 2851, Springer-Verlag
-
J. Zhou, F. Bao, and R.H. Deng. Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. In Proc. ISC '03, LNCS 2851, pp. 96-110, Springer-Verlag, 2003.
-
(2003)
Proc. ISC '03
, pp. 96-110
-
-
Zhou, J.1
Bao, F.2
Deng, R.H.3
|