-
1
-
-
33746616167
-
Password-based group key exchange in a constant number of rounds
-
LNCS. Springer-Verlag. To Appear
-
M. Abdalla, E. Bresson, O. Chevassut, and D. Pointcheval. Password-based Group Key Exchange in a Constant Number of Rounds. In PKC 2006, LNCS. Springer-Verlag, 2006. To Appear.
-
(2006)
PKC 2006
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Pointcheval, D.4
-
2
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
EUROCRYPT 2003. Springer-Verlag
-
L. Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In EUROCRYPT 2003, volume 2656 of LNCS, pages 294-311. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2656
, pp. 294-311
-
-
Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
3
-
-
84958775356
-
Transitive signatures based on factoring and RSA
-
ASIACRYPT 2002. Springer-Verlag
-
M. Bellare and G. Neven. Transitive Signatures Based on Factoring and RSA. In ASIACRYPT 2002, volume 2501 of LNCS, pages 397-414. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 397-414
-
-
Bellare, M.1
Neven, G.2
-
4
-
-
84958755223
-
Group Diffie-Hellman key exchange secure against dictionary attacks
-
ASIACRYPT 2002. Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks. In ASIACRYPT 2002, volume 2501 of LNCS, pages 497-514. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2501
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
5
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably Authenticated Group Diffie-Hellman Key Exchange. In ACM CCS 2001, pages 255-264, 2001.
-
(2001)
ACM CCS 2001
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
6
-
-
0000288916
-
A secure and efficient conference key distribution system
-
A. D. Santis, editor, LNCS
-
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. In A. D. Santis, editor, Pre-Proceedings of EUROCRYPT '94, LNCS, pages 279-290, 1994.
-
(1994)
Pre-proceedings of EUROCRYPT '94
, pp. 279-290
-
-
Burmester, M.1
Desmedt, Y.2
-
7
-
-
26444523527
-
N-party encrypted Diffie-Hellman key exchange using different passwords
-
ACNS 2005. Springer-Verlag
-
J. Byun and D. Lee. N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. In ACNS 2005, volume 3531 of LNCS, pages 75-90. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 75-90
-
-
Byun, J.1
Lee, D.2
-
8
-
-
35248845972
-
Open problems in data-sharing peer-to-peer systems
-
ICDT 2003. Springer-Verlag
-
N. Daswani, H. Garcia-Molina, and B. Yang. Open Problems in Data-Sharing Peer-to-Peer Systems. In ICDT 2003, volume 2572 of LNCS, pages 1-15. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2572
, pp. 1-15
-
-
Daswani, N.1
Garcia-Molina, H.2
Yang, B.3
-
10
-
-
0002459783
-
Client puzzles: A cryptographic defense against connection depletion
-
A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion. In NDSS 1999, pages 151-165, 1999.
-
(1999)
NDSS 1999
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
11
-
-
35048828834
-
Efficient password-based group key exchange
-
TrustBus 2004. Springer-Verlag
-
S. M. Lee, J. Y. Hwang, and D. H. Lee. Efficient Password-Based Group Key Exchange. In TrustBus 2004, volume 3184 of LNCS, pages 191-199. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3184
, pp. 191-199
-
-
Lee, S.M.1
Hwang, J.Y.2
Lee, D.H.3
-
12
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
T. Lomas, L. Gong, J. Saltzer, and R. Needham. Reducing Risks from Poorly Chosen Keys. ACM SIGOPS Operating Systems Review, 23(5):14-18, 1989.
-
(1989)
ACM SIGOPS Operating Systems Review
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.1
Gong, L.2
Saltzer, J.3
Needham, R.4
-
13
-
-
0038687701
-
Securing passwords against dictionary attacks
-
ACM Press
-
B. Pinkas and T. Sander. Securing Passwords Against Dictionary Attacks. In ACM CCS 2002, pages 161-170. ACM Press, 2002.
-
(2002)
ACM CCS 2002
, pp. 161-170
-
-
Pinkas, B.1
Sander, T.2
-
14
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
CRYPTO 1991. Springer-Verlag
-
C. Rackoff and D. R. Simon. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In CRYPTO 1991, volume 576 of LNCS, pages 433-444. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
-
15
-
-
33646850611
-
Weaknesses in two group Diffie-Hellman key exchange protocols
-
Q. Tang and L. Chen. Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols. Cryptology ePrint Archive: Report 2005/197, 2005.
-
(2005)
Cryptology EPrint Archive: Report
, vol.2005
, Issue.197
-
-
Tang, Q.1
Chen, L.2
|