-
1
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in cryptology - CT-RSA 2005, Springer-Verlag p. 191-208
-
Abdalla M., and Pointcheval D. Simple password-based encrypted key exchange protocols. Topics in cryptology - CT-RSA 2005. LNCS (2005), Springer-Verlag p. 191-208
-
(2005)
LNCS
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
0026850091
-
Encrypted key exchange: password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press
-
Bellovin S.M., and Merrit M. Encrypted key exchange: password-based protocols secure against dictionary attacks. Proceedings of IEEE symposium on research in security and privacy (May 1992), IEEE Computer Society Press 72-84
-
(1992)
Proceedings of IEEE symposium on research in security and privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
3
-
-
84949230533
-
Key agreement protocols and their security analysis
-
Proceedings of sixth IMA international conference on cryptography and coding, Springer-Verlag
-
Blake-Wilson S., Johnson D., and Menezes A. Key agreement protocols and their security analysis. Proceedings of sixth IMA international conference on cryptography and coding. LNCS 1355 (1997), Springer-Verlag 30-45
-
(1997)
LNCS 1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
4
-
-
35048899816
-
Key agreement using statically keyed authenticators
-
Applied cryptography and network security - ACNS'2004, Springer-Verlag p. 248-62
-
Boyd C., Mao W., and Paterson K. Key agreement using statically keyed authenticators. Applied cryptography and network security - ACNS'2004. LNCS 3089 (2004), Springer-Verlag p. 248-62
-
(2004)
LNCS 3089
-
-
Boyd, C.1
Mao, W.2
Paterson, K.3
-
5
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
7
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
8
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law L., Menezes A., Qu M., Solinas J., and Vanstone S. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28 2 (March 2003) 119-134
-
(2003)
Designs, Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
9
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
10
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
11
-
-
0008145442
-
Three party-encrypted key exchange: attacks and a solution
-
Lin C.L., Sun H.M., and Hwang T. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
12
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin C.L., Sun H.M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
14
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
15
-
-
33645437508
-
ID-based one round authenticated tripartite key agreement protocol with pairings
-
Available from:
-
Zhang F., Liu S., and Kim K. ID-based one round authenticated tripartite key agreement protocol with pairings. Cryptology ePrint archive, report 2002/122 (2002). http://eprint.iarc.org/2002/122 Available from:
-
(2002)
Cryptology ePrint archive, report 2002/122
-
-
Zhang, F.1
Liu, S.2
Kim, K.3
|