-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
[BPR00] EUROCRYPT 2000 Bruges, Belgium, B. Preneel (Ed.), Springer
-
[BPR00] BELLARE, M., POINTCHEVAL, D., AND ROGAWAY, P. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 139-155.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
2
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
[BM92] Oakland, CA, USA, IEEE
-
[BM92] BELLOVIN, S. M., AND MERRITT, M. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security & Privacy (Oakland, CA, USA, 1992), IEEE, pp. 72-84.
-
(1992)
IEEE Security & Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
[BM93] Fairfax, VA, USA, ACM
-
[BM93] BELLOVIN, S. M., AND MERRITT, M. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In 1st CCS (Fairfax, VA, USA, 1993), ACM, pp. 244-250.
-
(1993)
1st CCS
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
4
-
-
84947778144
-
The decision Diffie-Hellman problem
-
[Bon98] Proc. of the 3rd Algorithmic Number Theory Symp.
-
[Bon98] BONEH, D. The decision Diffie-Hellman problem. In Proc. of the 3rd Algorithmic Number Theory Symp. (1998), LNCS 1423, pp. 48-63.
-
(1998)
LNCS
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
5
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
[BMP00] EUROCRYPT 2000 Bruges, Belgium, B. Preneel (Ed.), Springer
-
[BMP00] BOYKO, V., MACKENZIE, P., AND PATEL, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 156-171.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
6
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
[CK01] EUROCRYPT 2001 Innsbruck, Austria, B. Pfitzmann (Ed.), Springer
-
[CK01] CANETTI, R., AND KRAWCZYK, H. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 453-474.
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
8
-
-
0017018484
-
New directions in cryptography
-
[DH76]
-
[DH76] DIFFIE, W., AND HELLMAN, M. E. New directions in cryptography. IEEE Trans. Inf. Theory IT-11 (1976), 644-654.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-11
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
10
-
-
24144468439
-
A framework for password-based authenticated key exchange
-
[GL03] IBM T.J. Watson, 2003. Abstract appeared in EUROCRYPT
-
[GL03] GENNARO, R., AND LINDELL, Y. A framework for password-based authenticated key exchange. Tech. rep., IBM T.J. Watson, 2003. Abstract appeared in EUROCRYPT 2003.
-
(2003)
Tech. Rep.
-
-
Gennaro, R.1
Lindell, Y.2
-
11
-
-
0030261758
-
Strong password-only authenticated key exchange
-
[Jab96]
-
[Jab96] JABLON, D. P. Strong password-only authenticated key exchange. Comput. Comm. Rev. (1996). http://www.std.com/~dpj and www.integritysciences. com.
-
(1996)
Comput. Comm. Rev.
-
-
Jablon, D.P.1
-
12
-
-
84904204049
-
Security modelling for electronic commerce: The common electronic purse specifications
-
[JW01] Zürich, Switzerland, Kluwer
-
[JW01] JÜRJENS, J., AND WIMMEL, G. Security modelling for electronic commerce: The common electronic purse specifications. In First IFIP conference on e-commerce, e-business, and e-government (I3E) (Zürich, Switzerland, 2001), Kluwer.
-
(2001)
First IFIP Conference on E-commerce, E-business, and E-government (I3E)
-
-
Jürjens, J.1
Wimmel, G.2
-
13
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
[KOY01] EUROCRYPT 2001 Innsbruck, Austria, B. Pfitzmann (Ed.), Springer
-
[KOY01] KATZ, J., OSTROVSKY, R., AND YUNG, M. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 475-494.
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
14
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
[Luc97]
-
[Luc97] LUCKS, S. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In The Security Protocol Workshop '97 (1997), pp. 79-90.
-
(1997)
The Security Protocol Workshop '97
, pp. 79-90
-
-
Lucks, S.1
-
15
-
-
84937579448
-
More efficient password-authenticated key exchange
-
[Mac01] Topics in Cryptography (CT-RSA) Springer
-
[Mac01] MACKENZIE, P. More efficient password-authenticated key exchange. In Topics in Cryptography (CT-RSA) (2001), LNCS 2020, Springer, pp. 361-377.
-
(2001)
LNCS
, vol.2020
, pp. 361-377
-
-
Mackenzie, P.1
-
16
-
-
35048845896
-
Solution to Bluetooth multiuser problem using method of tokens
-
[Mob01] MOBILE ELECTRONIC TRANSACTIONS.
-
[Mob01] MOBILE ELECTRONIC TRANSACTIONS. Solution to Bluetooth multiuser problem using method of tokens. Tech. rep., 2001. http://www.mobiletransaction. org/.
-
(2001)
Tech. Rep.
-
-
-
17
-
-
0004023090
-
On formal models for secure key exchange
-
[Sho99] IBM, Invited talk at ACM Computer and Communications Security conference, 1999
-
[Sho99] SHOUP, V. On formal models for secure key exchange. Tech. Rep. RZ 3120 (#93166), IBM, 1999. Invited talk at ACM Computer and Communications Security conference, 1999.
-
(1999)
Tech. Rep. RZ 3120 (#93166)
-
-
Shoup, V.1
-
18
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
[SA99] B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS
-
[SA99] STAJANO, F., AND ANDERSON, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Procotols, 7th Int. Workshop (1999), B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS, pp. 172-194.
-
(1999)
Security Procotols, 7th Int. Workshop
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
|