-
1
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
-
Bellovin S., and Merritt M. Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks. Proc. of the Symposium on Security and Privacy (1992) 72-84
-
(1992)
Proc. of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
2
-
-
0027741529
-
Augmented Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks and Password File Compromise
-
ACM Press
-
Bellovin S., and Merritt M. Augmented Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks and Password File Compromise. Proc. of the 1st CCS (1993), ACM Press 244-250
-
(1993)
Proc. of the 1st CCS
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
3
-
-
84937550984
-
Provably secure password authenticated key exchange using Diffie-Hellman
-
Advances in Cryptology Eurocrypt '00, Springer, Berlin
-
Boyko V., MacKenzie P., and Patel S. Provably secure password authenticated key exchange using Diffie-Hellman. Advances in Cryptology Eurocrypt '00. Lecture Notes in Computer Science vol. 1807 (1985), Springer, Berlin 156-171
-
(1985)
Lecture Notes in Computer Science
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology Eurocrypt '00, Springer, Berlin
-
Bellare M., Pointcheval D., and Rogaway P. Authenticated key exchange secure against dictionary attacks. Advances in Cryptology Eurocrypt '00. Lecture Notes in Computer Science vol. 1807 (1985), Springer, Berlin 139-155
-
(1985)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
33747171940
-
The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
-
Choo K.-K.R., Boyd C., and Hitchcock Y. The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29 15 (2006) 2788-2797
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2788-2797
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
7
-
-
27744498991
-
A new efficient authentication protocol for mobile networks
-
Hwang R., and Su F. A new efficient authentication protocol for mobile networks. Computer Standards and Interfaces 28 2 (2005) 241-252
-
(2005)
Computer Standards and Interfaces
, vol.28
, Issue.2
, pp. 241-252
-
-
Hwang, R.1
Su, F.2
-
8
-
-
34548141100
-
-
3GPP2 N.S001 v1.0, OTASP and OTAPA, available at: http://www.3gpp2.org Jan. 1999.
-
-
-
-
9
-
-
34548141083
-
-
3GPP2 C.S0016-B v1.0, Over-the-Air Service Provisioning of mobile stations in spread spectrum standards, available at: http://www.3gpp2.org Oct. 2002.
-
-
-
-
10
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Mathematics of Computation 48 177 (1987) 203-209
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
11
-
-
34548135536
-
Off-line password guessing attack on an efficient key agreement protocol for secure authentication
-
Lu R., and Cao Z. Off-line password guessing attack on an efficient key agreement protocol for secure authentication. International Journal of Network Security 3 1 (2006) 35-38
-
(2006)
International Journal of Network Security
, vol.3
, Issue.1
, pp. 35-38
-
-
Lu, R.1
Cao, Z.2
-
12
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Advances in Cryptology - Crypto 85, Springer, Berlin
-
Miller V.S. Use of elliptic curves in cryptography. Advances in Cryptology - Crypto 85. Lecture Notes in Computer Science vol. 128 (1985), Springer, Berlin 417-426
-
(1985)
Lecture Notes in Computer Science
, vol.128
, pp. 417-426
-
-
Miller, V.S.1
-
15
-
-
24944544374
-
An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication
-
Sui A., Hui L., Yiu S., Chow K., Tsang W., Chong C., Pun K., and Chan H. An improved authenticated key agreement protocol with perfect forward secrecy for wireless mobile communication. IEEE Wireless and Communications and Networking Conference (WCNC 2005) (2005) 2088-2093
-
(2005)
IEEE Wireless and Communications and Networking Conference (WCNC 2005)
, pp. 2088-2093
-
-
Sui, A.1
Hui, L.2
Yiu, S.3
Chow, K.4
Tsang, W.5
Chong, C.6
Pun, K.7
Chan, H.8
-
16
-
-
0032658583
-
Simple authenticated key agreement algorithm
-
Seo D., and Sweeney P. Simple authenticated key agreement algorithm. Electronics Letters 35 13 (1999) 1073-1074
-
(1999)
Electronics Letters
, vol.35
, Issue.13
, pp. 1073-1074
-
-
Seo, D.1
Sweeney, P.2
|