-
1
-
-
0036949106
-
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model
-
Barak, B.: Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model. IEEE Symposium on Foundations of Computer Science (2002) 345-355
-
(2002)
IEEE Symposium on Foundations of Computer Science
, pp. 345-355
-
-
Barak, B.1
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Advances in Cryptology-Eurocrypt 2000 Proceedings
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. Advances in Cryptology-Eurocrypt 2000 Proceedings, Lecture Notes in Computer Science 1807 (2000) 139-155
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Advances in Cryptology - Crypto 93 Proceedings, Lecture
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. Advances in Cryptology - Crypto 93 Proceedings, Lecture Notes in Computer Science 773 (1994) 232-249
-
(1994)
Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
-
Bellovin, S., Merritt, M.: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM Conference on Computer and Communications Security (1993) 244-250
-
(1993)
ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
7
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Advances in Cryptology-Eurocrypt 2000 Proceedings
-
Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. Advances in Cryptology-Eurocrypt 2000 Proceedings, Lecture Notes in Computer Science 1807 (2000) 156-171
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
8
-
-
0035163054
-
Universally Composable Security: A New Paradigm for Cryptographic Protocols
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. IEEE Symposium on Foundations of Computer Science (2001) 136-145
-
IEEE Symposium on Foundations of Computer Science
, vol.2001
, pp. 136-145
-
-
Canetti, R.1
-
9
-
-
0023985259
-
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
-
Chor, B., Goldreich, O.: Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. SIAM Journal on Computing 17:2 (1988) 230-261
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 230-261
-
-
Chor, B.1
Goldreich, O.2
-
11
-
-
35248830706
-
A Framework for Password-Based Authenticated Key Exchange
-
Advances in Cryptology - Eurocrypt 2003 Proceedings
-
Gennaro, R., Lindell, Y.: A Framework for Password-Based Authenticated Key Exchange. Advances in Cryptology - Eurocrypt 2003 Proceedings, Lecture Notes in Computer Science 2656 (2003) 524-543
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
12
-
-
84880888233
-
Session-Key Generation Using Human Passwords only
-
Advances in Cryptology - Crypto 2001 Proceedings
-
Goldreich, O., Lindell, Y.: Session-Key Generation Using Human Passwords Only. Advances in Cryptology - Crypto 2001 Proceedings, Lecture Notes in Computer Science 2139 (2001) 408-432
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
13
-
-
0031504510
-
Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing
-
Goldreich, O., Wigderson, A.: Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing. Random Structures and Algorithms 11:4 (1997) 315-343
-
(1997)
Random Structures and Algorithms
, vol.11
, Issue.4
, pp. 315-343
-
-
Goldreich, O.1
Wigderson, A.2
-
16
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Advances in Cryptology - Eurocrypt 2001 Proceedings
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Advances in Cryptology - Eurocrypt 2001 Proceedings, Lecture Notes in Computer Science 2045 (2001) 475-494
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
17
-
-
0036825859
-
Pretty-Simple Password-Authenticated Key-Exchange under Standard Assumptions
-
Kobara, K., Imai, H.: Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions. IECIE Trans. E85-A:10 (2002) 2229-2237
-
(2002)
IECIE Trans.
, vol.E85-A
, Issue.10
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
18
-
-
0023985474
-
The Notion of Security for Probabilistic Cryptosystems
-
Micali, S., Rackoff, C., Sloan, B.: The Notion of Security for Probabilistic Cryptosystems. SIAM Journal on Computing 17 (1988) 412-426
-
(1988)
SIAM Journal on Computing
, vol.17
, pp. 412-426
-
-
Micali, S.1
Rackoff, C.2
Sloan, B.3
-
21
-
-
84957621865
-
On the Concurrent Composition of Zero-Knowledge Proofs
-
Advances in Cryptology - Eurocrypt 99 Proceedings
-
Richardson, R., Kilian, J.: On the Concurrent Composition of Zero-Knowledge Proofs. Advances in Cryptology - Eurocrypt 99 Proceedings, Lecture Notes in Computer Science 1592 (1999) 415-431
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 415-431
-
-
Richardson, R.1
Kilian, J.2
-
22
-
-
0004023090
-
On Formal Models for Secure Key Exchange
-
Report 1999/012
-
Shoup, V.: On Formal Models for Secure Key Exchange. Cryptology ePrint Archive (1999) Report 1999/012
-
(1999)
Cryptology EPrint Archive
-
-
Shoup, V.1
-
24
-
-
0002839106
-
Refinement and Extension of Encrypted Key Exchange
-
Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29:3 (1995) 22-30
-
(1995)
Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|