-
1
-
-
0038687767
-
Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols
-
ACM Press, New York
-
W. Aiello, S. M. Bellovin, M. Blaze, R. Canetti, J. Ioannidis, A. D. Keromytis, and O. Reingold. Efficient, DoS-resistant, Secure Key Exchange for Internet Protocols. In Proc. of the 9th CCS, pages 48-58. ACM Press, New York, 2002.
-
(2002)
Proc. of the 9th CCS
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
Springer-Verlag, Berlin
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Eurocrypt '00, LNCS 1807, pages 139-155. Springer-Verlag, Berlin, 2000.
-
(2000)
Eurocrypt '00, LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
18744413077
-
The AuthA Protocol for Password-Based Authenticated Key Exchange
-
March
-
M. Bellare and P. Rogaway. The AuthA Protocol for Password-Based Authenticated Key Exchange. Contributions to IEEE P1363. March 2000. Available from http://grouper.ieee.org/groups/1363/.
-
(2000)
Contributions to IEEE P
, vol.1363
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0027726717
-
Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols
-
ACM Press, New York
-
M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62-73. ACM Press, New York, 1993.
-
(1993)
Proc. of the 1st CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0026850091
-
Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks
-
IEEE
-
S. M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks. In Proc. of the Symposium on Security and Privacy, pages 72-84. IEEE, 1992.
-
(1992)
Proc. of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
-
ACM Press, New York
-
S. M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. In Proc. of the 1st CCS, pages 244-250. ACM Press, New York, 1993.
-
(1993)
Proc. of the 1st CCS
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
7
-
-
84937550984
-
Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman
-
Springer-Verlag, Berlin
-
V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman. In Eurocrypt '00, LNCS 1807, pages 156-171. Springer-Verlag, Berlin, 2000. Final version available at: http://cm.bell-labs.com/who/philmac/research/.
-
(2000)
Eurocrypt '00, LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
8
-
-
18744393738
-
Security Proofs for Efficient Password-Based Key Exchange
-
New York, 2003. The full version is available on the Cryptology ePrint Archive
-
E. Bresson, O. Chevassut, and D. Pointcheval. Security Proofs for Efficient Password-Based Key Exchange. In Proc. of the 10th CCS. ACM Press, New York, 2003. The full version is available on the Cryptology ePrint Archive 2002/192.
-
(2002)
Proc. of the 10th CCS. ACM Press
, vol.192
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
35048874665
-
New Security Results on Encrypted Key Exchange
-
Springer-Verlag, Berlin
-
E. Bresson, O. Chevassut, and D. Pointcheval. New Security Results on Encrypted Key Exchange. In PKC '04, LNCS. Springer-Verlag, Berlin, 2004. Full version available at: http://www.di.ens.fr/users/pointche/.
-
(2004)
PKC '04, LNCS.
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
10
-
-
35248835679
-
On Memory-Bound Functions for Fighting Spam
-
Springer-Verlag, Berlin
-
C. Dwork, A. Goldberg, and M. Naor. On Memory-Bound Functions for Fighting Spam. In Crypto '03, LNCS 2729, pages 426-444. Springer-Verlag, Berlin, 2003.
-
(2003)
Crypto '03, LNCS
, vol.2729
, pp. 426-444
-
-
Dwork, C.1
Goldberg, A.2
Naor, M.3
-
12
-
-
84861587712
-
Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks
-
A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. In Proc. of NDSS '99, pages 151-165, 1999.
-
(1999)
Proc. of NDSS '99
, pp. 151-165
-
-
Juels, A.1
Brainard, J.2
-
13
-
-
0023984964
-
How to Construct Pseudorandom Permutations from Pseudorandom Functions
-
M. Luby and Ch. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal of Computing, 17(2):373-386, 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, Ch.2
-
14
-
-
1642489925
-
OAEP Reconsidered
-
September
-
V. Shoup. OAEP Reconsidered. Journal of Cryptology, 15(4):223-249, September 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
|