-
1
-
-
0344205205
-
Minding Your p's and q's
-
Advaces in Cryptology ASIACRYPT'96, Springer-Verlag
-
R. Anderson and S. Vaudenay, Minding Your p's and q's, in Advaces in Cryptology ASIACRYPT'96, LNCS 963, pages 236-247, Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.963
, pp. 236-247
-
-
Anderson, R.1
Vaudenay, S.2
-
2
-
-
35248889041
-
Security Analysis of a Password Authenticated Key Exchange Protocol
-
Proceedings of ISC'03, Springer-Verlag
-
F. Bao, Security Analysis of a Password Authenticated Key Exchange Protocol, in Proceedings of ISC'03, LNCS 2851, pages 208-217, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2851
, pp. 208-217
-
-
Bao, F.1
-
3
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Springer-Verlag
-
M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, in Advances in cryptology - Crypto'93, pages 232-249, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology - Crypto'93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks
-
S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks, in Proceedings of IEEE Security and Privacy, pages 72-84, 1992.
-
(1992)
Proceedings of IEEE Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
5
-
-
0027741529
-
Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise
-
S. Bellovin and M. Merritt, Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise. ACM Secrity '93, pages 244-250.
-
ACM Secrity '93
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
6
-
-
84937550984
-
Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman
-
Advances in cryptology - EUROCRYPT 2000, Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel, Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman. in Advances in cryptology - EUROCRYPT 2000, LNCS 1807, pages 156-171, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
7
-
-
84944063128
-
Password-Authenticated Key Exchange between Clients with Different Passwords
-
Proceedings of Information and Communications Security - ICICS 2002, Springer-Verlag
-
J. W. Byun, I. R. Jeong, D. H. Lee, and C-S. Park, Password-Authenticated Key Exchange Between Clients with Different Passwords, in Proceedings of Information and Communications Security - ICICS 2002, LNCS 2513, pages 134-146, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2513
, pp. 134-146
-
-
Byun, J.W.1
Jeong, I.R.2
Lee, D.H.3
Park, C.-S.4
-
8
-
-
84947224925
-
Efficient Kerberized multicast in Practical distributed setting
-
Proceedings of ISCOl, Springer-Verlag
-
G. D. Crescenzo, and O. Kornievskaia, Efficient Kerberized multicast in Practical distributed setting, in Proceedings of ISCOl, LNCS 2000, pages 27-45, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2000
, pp. 27-45
-
-
Crescenzo, G.D.1
Kornievskaia, O.2
-
9
-
-
1542593353
-
Authentication and Authenticated Key Exchange
-
W. Diffie, P. Van Oorschot and M. Wiener, Authentication and Authenticated Key Exchange, Designs, Codes and Cryptography, 2, 1992, pages 107-125.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
10
-
-
0029531472
-
Optimal Authentication Protocols Resistant to Password Guessing Attacks
-
L. Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks, in 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
11
-
-
0027615231
-
Protecting Poorly Chosen Secrets from Guessing Attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, Protecting Poorly Chosen Secrets from Guessing Attacks, IEEE Journal on Selected Areas in Communications, 11(5), pages 648-656, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
12
-
-
26844522740
-
EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange
-
Proceedings of ACISP SOUS, Springer-Verlag Berlin Heidelberg 2003
-
Y. H. Hwang, D. H. Yum, and P. J. Lee, EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange, in Proceedings of ACISP SOUS, LNCS 2727, Springer-Verlag Berlin Heidelberg 2003, pages 452-463, 2003
-
(2003)
LNCS
, vol.2727
, pp. 452-463
-
-
Hwang, Y.H.1
Yum, D.H.2
Lee, P.J.3
-
13
-
-
0030261758
-
Strong Password-Only Authenticated Key Exchange
-
October
-
D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, vol.26, no.5, pp. 5-20, October 1996.
-
(1996)
ACM Computer Communications Review
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
14
-
-
85084161708
-
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks
-
July
-
B. Jaspan, Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks, in Proceedings of the 6th Annual USENIX Security Conference, pages 43-50, July, 1996.
-
(1996)
Proceedings of the 6th Annual USENIX Security Conference
, pp. 43-50
-
-
Jaspan, B.1
-
16
-
-
0033157651
-
An Improvment of the Password-Based Authentication Protocol (KlP) on Security against Replay Attacks
-
T. Kwon, M. Kang, S. Jung, and J. Song, An Improvment of the Password-Based Authentication Protocol (KlP) on Security against Replay Attacks, IEICE Irans. Commun., E82-B(7), pages 991-997, 1999.
-
(1999)
IEICE Irans. Commun.
, vol.E82-B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
17
-
-
0031381717
-
An Adaptable and Reliable Authentication Protocol for Communication Networks
-
T. Kwon, M. Kang, and J. Song, An Adaptable and Reliable Authentication Protocol for Communication Networks, in Proceedings of IEEE INFOCOM'97, pages 737-744, 1997.
-
(1997)
Proceedings of IEEE INFOCOM'97
, pp. 737-744
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
18
-
-
0029208641
-
Several Practical Protocols for Authentication to Thresh-old Cryptosystems
-
C. H. Lim and P. J. Lee, Several Practical Protocols for Authentication to Thresh-old Cryptosystems, Information Processing Letters, 53, 1995, pages 91-96.
-
(1995)
Information Processing Letters
, vol.53
, pp. 91-96
-
-
Lim, C.H.1
Lee, P.J.2
-
19
-
-
0008145442
-
Three-party Encrypted Key Exchange: Attacks and a Solution
-
C.-L. Lin, Hung-Min Sun and T. Hwang. Three-party Encrypted Key Exchange: Attacks and A Solution. ACM Operating Systems Review, 34(4):12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.-L.1
Sun, H.-M.2
Hwang, T.3
-
20
-
-
0035701459
-
Three-party Encrypted Key Exchange Without Server Public-Keys
-
December
-
C.-L. Lin, H.-M. Sun and T. Hwang. Three-party Encrypted Key Exchange Without Server Public-Keys. IEEE Communications Letters, 5(12):497-499, December 2001.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Hwang, T.3
-
21
-
-
84957025686
-
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
-
Proceedings of Security Protocols Workshop, Springer-Verlag
-
S. Lucks, Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys, in Proceedings of Security Protocols Workshop, LNCS 1361, pages 79-90, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1361
, pp. 79-90
-
-
Lucks, S.1
-
22
-
-
84937402236
-
Password-Authenticated Key Exchange Based on RSA
-
Proceedings of AsiaCrypt 2000, Springer-Verlag
-
P. MacKenzie, S. Patel, and R. Swaminathan, Password-Authenticated Key Exchange Based on RSA, in Proceedings of AsiaCrypt 2000, LNCS 1976, pages 599-613, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
23
-
-
33846461562
-
The PAK suite: Protocols for Password-Authenticated Key Exchange
-
April
-
P. MacKenzie, The PAK suite: Protocols for Password-Authenticated Key Exchange, Submission to IEEE P1363.2, April 2002.
-
(2002)
Submission to IEEE P1363.2
-
-
MacKenzie, P.1
-
24
-
-
84937579448
-
More Efficient Password-Authenticated Key Exchange
-
P. MacKenzie, More Efficient Password-Authenticated Key Exchange, Progress in Cryptology - CT-RSA 2001, pages 361-377, 2001.
-
(2001)
Progress in Cryptology - CT-RSA 2001
, pp. 361-377
-
-
MacKenzie, P.1
-
25
-
-
84947723778
-
n
-
Advances in cryptology-ASIACRYPT'98, Spinger-Verlag
-
n in Advances in cryptology-ASIACRYPT'98, LNCS 1514, Spinger-Verlag, 1998, pp.214-226.
-
(1998)
LNCS
, vol.1514
, pp. 214-226
-
-
Mao, W.1
Lim, C.H.2
-
27
-
-
0001636850
-
Kerberos: An Authentication Service for Open Network Systems
-
February
-
J. G. Steiner, B. C. Newman, and J. I. Schiller, Kerberos: An Authentication Service for Open Network Systems, in USENIX Conference Proceedings, pages 191-202, February, 1988.
-
(1988)
USENIX Conference Proceedings
, pp. 191-202
-
-
Steiner, J.G.1
Newman, B.C.2
Schiller, J.I.3
-
28
-
-
0002839106
-
Refinement and Extension of Encrypted Key Exchange
-
M. Steiner, G. Tsudik and M. Waidner. Refinement and Extension of Encrypted Key Exchange. ACM SIGOPS Operating Systems Review, 29(3), pages 22-30, 1995.
-
(1995)
ACM SIGOPS Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
29
-
-
35048901616
-
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
-
Proceedings of ACISP 2004, Springer-Verlage (to appear)
-
Z. Wan, and S. Wang, Cryptanalysis of Two Password-Authenticated Key Exchange Protocols, in Proceedings of ACISP 2004, LNCS, Springer-Verlage (to appear), 2004.
-
(2004)
LNCS
-
-
Wan, Z.1
Wang, S.2
-
31
-
-
84945247158
-
Password authenticated key exchange based on RSA for imbalanced wireless networks
-
Proceedings of ISC 2002, Springer-Verlag
-
F. Zhu, D. S. Wong, A. H. Chan, and R. Ye, Password authenticated key exchange based on RSA for imbalanced wireless networks, in Proceedings of ISC 2002, LNCS 2433, pp. 150-161, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 150-161
-
-
Zhu, F.1
Wong, D.S.2
Chan, A.H.3
Ye, R.4
|