-
1
-
-
0344205205
-
Minding Your p's and q's
-
Advaces in Cryptology - ASIACRYPT'96, Springer-Verlag
-
R. Anderson and S. Vaudenay, Minding Your p's and q's, Advaces in Cryptology - ASIACRYPT'96, LNCS 963, pages 236-247, Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.963
, pp. 236-247
-
-
Anderson, R.1
Vaudenay, S.2
-
2
-
-
15744393134
-
Security Analysis of a Password Authenticated Key Exchange Protocol
-
F. Bao, Security Analysis of a Password Authenticated Key Exchange Protocol, Proceedings of ISC 2003, 2003.
-
(2003)
Proceedings of ISC 2003
-
-
Bao, F.1
-
3
-
-
84947913130
-
Generating ElGamal Signatures without Knowing the Secret
-
Advances in Cryptology - EUROCRYPT'96, Springer-Verlag
-
D. Bleichenbacher, Generating ElGamal Signatures without Knowing the Secret, Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pages 10-18, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 10-18
-
-
Bleichenbacher, D.1
-
5
-
-
0027741529
-
Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise
-
S. Bellovin and M. Merritt, Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise. Proceedings of CCS'93, pages 244-250, 1993.
-
(1993)
Proceedings of CCS'93
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
6
-
-
84937550984
-
Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman
-
V. Boyko, P. MacKenzie, and S. Patel, Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman. EUROCRYPT 2000, pages 156-171.
-
EUROCRYPT
, vol.2000
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
7
-
-
0029531472
-
Optimal Authentication Protocols Resistant to Password Guessing Attacks
-
L. Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks. 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
8
-
-
26844522740
-
EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange
-
ACISP 2003, Springer-Verlag Berlin Heidelberg 2003
-
Y. H. Hwang, D. H. Yum, and P. J. Lee, EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange, ACISP 2003, LNCS 2727, Springer-Verlag Berlin Heidelberg 2003, pages 452-463, 2003.
-
(2003)
LNCS
, vol.2727
, pp. 452-463
-
-
Hwang, Y.H.1
Yum, D.H.2
Lee, P.J.3
-
9
-
-
0030261758
-
Strong Password-Only Authenticated Key Exchange
-
D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, vol.26, no.5, 1996.
-
(1996)
ACM Computer Communications Review
, vol.26
, Issue.5
-
-
Jablon, D.1
-
10
-
-
85180777204
-
Authentication and Key Agreement via Memorable Password
-
T. Kwon, Authentication and Key Agreement via Memorable Password, Proceedings of the ISOC NDSS Symposium, 2001.
-
(2001)
Proceedings of the ISOC NDSS Symposium
-
-
Kwon, T.1
-
11
-
-
35048861091
-
-
Contribution for the P1363 standard, August
-
T. Kwon, Summary of AMP, Contribution for the P1363 standard, available at http://grouper.ieee.org/groups/1363/passwdPK/contributions/ampsummary.pdf, August 2003.
-
(2003)
Summary of AMP
-
-
Kwon, T.1
-
12
-
-
35048882198
-
-
Contribution for the P1363 standard, November
-
T. Kwon, Addendum to Summary of AMP, Contribution for the P1363 standard, available at http://grouper.ieee.org/groups/1363/passwdPK/contributions/ ampsummary2.pdf, November 2003.
-
(2003)
Addendum to Summary of AMP
-
-
Kwon, T.1
-
13
-
-
84958601057
-
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup
-
Burton S. Kaliski Jr(Ed.), Advances in Cryptology - CRYPTO '97, Springer-Verlag
-
C. H. Lim and P. J. Lee, A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup, Burton S. Kaliski Jr(Ed.), Advances in Cryptology - CRYPTO '97, LNCS 1294, Springer-Verlag, pages 249-263, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 249-263
-
-
Lim, C.H.1
Lee, P.J.2
-
14
-
-
84957025686
-
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
-
Proceedings of Security Protocols Workshop, Springer-Verlag
-
S. Lucks, Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys, Proceedings of Security Protocols Workshop, LNCS 1361, pages 79-90, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1361
, pp. 79-90
-
-
Lucks, S.1
-
15
-
-
84937402236
-
Password-Authenticated Key Exchange Based on RSA
-
Proceedings of AsiaCrypt 2000, Springer-Verlag
-
P. MacKenzie, S. Patel, and R. Swaminathan, Password-Authenticated Key Exchange Based on RSA, Proceedings of AsiaCrypt 2000, pages 599-613, LNCS, Springer-Verlag, 2000.
-
(2000)
LNCS
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
16
-
-
33846461562
-
The PAK Suite: Protocols for Password-Authenticated Key Exchange
-
April
-
P. MacKenzie, The PAK Suite: Protocols for Password-Authenticated Key Exchange, Submission to IEEE P1363.2, April 2002.
-
(2002)
Submission to IEEE P1363.2
-
-
MacKenzie, P.1
-
17
-
-
84937579448
-
More Efficient Password-Authenticated Key Exchange
-
P. MacKenzie, More Efficient Password-Authenticated Key Exchange, Progress in Cryptology - CT-RSA 2001, pages 361-377, 2001.
-
(2001)
Progress in Cryptology - CT-RSA 2001
, pp. 361-377
-
-
MacKenzie, P.1
-
18
-
-
84947723778
-
n
-
Advances in Cryptology-ASIACRYPT'98, Spinger-Verlag
-
n, Advances in Cryptology-ASIACRYPT'98, LNCS 1514, Spinger-Verlag, 1998, pp.214-226.
-
(1998)
LNCS
, vol.1514
, pp. 214-226
-
-
Mao, W.1
Lim, C.H.2
-
20
-
-
35048831079
-
Attacks Based on Small Factors in Various Group Structures
-
ACISP 2001
-
C. Pavlovski and C. Boyd, Attacks Based on Small Factors in Various Group Structures, ACISP 2001, LNCS 2119, pages 36-50, 2001.
-
(2001)
LNCS
, vol.2119
, pp. 36-50
-
-
Pavlovski, C.1
Boyd, C.2
-
21
-
-
84919085619
-
An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance
-
S. Pohlig and M. Hellman, An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance, IEEE Transactions on Information Theory, vol 24, no 1, pages 106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
22
-
-
84966238549
-
Monte Carlo Methods for Index Computation (mod p)
-
J. M.Pollard, Monte Carlo Methods for Index Computation (mod p), Math. Comp., 32(143), pages. 918-924, 1978.
-
(1978)
Math. Comp.
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
23
-
-
1842499869
-
On Diffie-Hellman Key Agreement with Short Exponents
-
EUROCRYPT'96
-
P. C. van Oorschot and M. Wiener, On Diffie-Hellman Key Agreement with Short Exponents, EUROCRYPT'96 LNCS 1070, pages 332-343, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 332-343
-
-
Van Oorschot, P.C.1
Wiener, M.2
-
24
-
-
84955603054
-
Hidden Collisions on DSS
-
Advances in Cryptology - CRYPTO'96, Springer-Verlag
-
S. Vaudenay, Hidden Collisions on DSS, Advances in Cryptology - CRYPTO'96, LNCS 1109, pages 83-88, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 83-88
-
-
Vaudenay, S.1
-
26
-
-
84945247158
-
Password authenticated key exchange based on RSA for unbalanced wireless networks
-
Proceedings of ISC 2002, Springer-Verlag
-
F. Zhu, D. S. Wong, A. H. Chan, and R. Ye, Password authenticated key exchange based on RSA for unbalanced wireless networks, Proceedings of ISC 2002, LNCS 2433, pp. 150-161, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 150-161
-
-
Zhu, F.1
Wong, D.S.2
Chan, A.H.3
Ye, R.4
|