-
1
-
-
0003515822
-
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
-
M. Abadi. Explicit Communication Revisited: Two New Attacks on Authentication Protocols. IEEE Transactions on Software Engineering, Vol. 23, No. 3, pp. 185-186, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.3
, pp. 185-186
-
-
Abadi, M.1
-
2
-
-
24144491593
-
Password-Based Authenticated Key Exchange in the Three-Party Setting
-
M. Abdalla, P.-A. Fouque, and D. Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. Proc. PKC ’05, LNCS 3386, pp. 65-84, 2005.
-
(2005)
Proc. PKC ’05, LNCS 3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
3
-
-
26444476977
-
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
-
M. Abdalla and D. Pointcheval. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Proc. FC ’05, LNCS 3570, pp. 341-356, 2005.
-
(2005)
Proc. FC ’05, LNCS 3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
4
-
-
72949109453
-
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
-
available online at
-
M. Abdalla and D. Pointcheval. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication. Full version of [3], available online at http://www.di.ens.fr/∼pointche/pub.php?reference=AbPo05.
-
Full Version of [3]
-
-
Abdalla, M.1
Pointcheval, D.2
-
5
-
-
0003605208
-
Security Engineering − A Guide to Building Dependable Distributed Systems
-
Wiley, USA
-
R. Anderson. Security Engineering − A Guide to Building Dependable Distributed Systems. Wiley, USA, 2001.
-
(2001)
-
-
Anderson, R.1
-
7
-
-
0001940580
-
Provably Secure Session Key Distribution: The Three Party Case
-
M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: the Three Party Case. Proc. ACM STOC ’95, pp. 57–66, 1995.
-
(1995)
Proc. ACM STOC ’95
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. Advances in Cryptology - Eurocrypt ’00, LNCS 1807, pp. 139-155, 2000.
-
(2000)
Advances in Cryptology - Eurocrypt ’00, LNCS 1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
9
-
-
0026850091
-
Encrypted Key Exchange: Passwords based Protocols Secure against Dictionary Attacks
-
S. Bellovin and M. Merritt. Encrypted Key Exchange: Passwords based Protocols Secure against Dictionary Attacks. Proc. IEEE Symposium on Security & Privacy ’92, pp. 72-84, 1992.
-
(1992)
Proc. IEEE Symposium on Security & Privacy ’92
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
10
-
-
84944063128
-
Password-Authenticated Key Exchange between Clients with Different Passwords
-
J.W. Byun, I.R. Jeong, D.H. Lee, and C.S. Park. Password-Authenticated Key Exchange between Clients with Different Passwords. Proc. ICICS ’02, LNCS 2513, pp. 134-146, 2002.
-
(2002)
ICICS ’02, LNCS 2513
, pp. 134-146
-
-
Byun, J.W.1
Jeong, I.R.2
Lee, D.H.3
Parkproc, C.S.4
-
11
-
-
26444523527
-
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
-
J.W. Byun and D.H. Lee. N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Proc. ACNS ’05, LNCS 3531, pp. 75-90, 2005.
-
(2005)
ACNS ’05, LNCS 3531
, pp. 75-90
-
-
Byun, J.W.1
Leeproc, D.H.2
-
12
-
-
33745677007
-
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol
-
J.W. Byun, D.H. Lee, and J. Lim. Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Proc. APWeb ’06, LNCS 3841, pp. 830-836, 2006.
-
(2006)
Proc. Apweb ’06, LNCS 3841
, pp. 830-836
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
-
13
-
-
26444541830
-
A Weakness of the Password-Authenticated Key Agreement between Clients with Different Passwords Scheme
-
ISO/IEC JTC 1/SC27 N3716, 2003-10-20.24
-
L. Chen. A Weakness of the Password-Authenticated Key Agreement between Clients with Different Passwords Scheme. Circulated for consideration at the 27th SC27/WG2 meeting in Paris, France, ISO/IEC JTC 1/SC27 N3716, 2003-10-20.24, 2003.
-
(2003)
Circulated for Consideration at the 27Th SC27/WG2 Meeting in Paris, France
-
-
Chen, L.1
-
14
-
-
33646805409
-
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
-
Advances in Cryptology - Asiacrypt ’05
-
K.-K.R. Choo, C. Boyd, and Y. Hitchcock. Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Advances in Cryptology - Asiacrypt ’05, LNCS 3788, pp. 585-604, 2005.
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
15
-
-
33646779184
-
Advances in Cryptology - Asiacrypt ’05, LNCS 3788
-
K.-K.R. Choo, C. Boyd, and Y. Hitchcock. Errors in Computational Complexity Proofs for Protocols. Advances in Cryptology - Asiacrypt ’05, LNCS 3788, pp. 624-643, 2005.
-
(2005)
Errors in Computational Complexity Proofs for Protocols
, pp. 624-643
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
16
-
-
33746614258
-
Password Based Server Aided Key Exchange
-
Y. Cliff, Y.S.T. Tin, and C. Boyd. Password Based Server Aided Key Exchange. Proc. ACNS ’06, LNCS 3989, pp. 146-161, 2006.
-
(2006)
Proc. ACNS ’06, LNCS 3989
, pp. 146-161
-
-
Cliff, Y.1
Tin, Y.S.T.2
Boyd, C.3
-
17
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
W. Diffie, P.C. van Oorschot, and M.J. Wiener. Authentication and Authenticated Key Exchanges. Design, Codes and Cryptography, Vol. 2, No. 2, pp. 107-125, 1992.
-
(1992)
Design, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
18
-
-
0002805220
-
Undetectable On-line Password Guessing Attacks
-
Y. Ding and P. Horster. Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review, Vol. 29, No. 4, pp. 77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
19
-
-
0348155938
-
A Password-Based Authenticator: Security Proof and Applications
-
Y. Hitchcock, Y.S.T. Tin, J.M. Gonzalez Nieto, C. Boyd, and P. Montague. A Password-Based Authenticator: Security Proof and Applications. Progress in Cryptology - Indocrypt ’03, LNCS 2904, pp. 388-401, 2003.
-
(2003)
Progress in Cryptology - Indocrypt ’03, LNCS 2904
, pp. 388-401
-
-
Hitchcock, Y.1
Tin, Y.S.T.2
Gonzalez Nieto, J.M.3
Boyd, C.4
Montague, P.5
-
20
-
-
67649746889
-
An Unknown Key-Share Attack on the MQV Key Agreement Protocol
-
B.S. Kaliski Jr. An Unknown Key-Share Attack on the MQV Key Agreement Protocol. ACM TISSEC, Vol. 4, No. 3, pp. 275-288, 2001.
-
(2001)
ACM TISSEC
, vol.4
, Issue.3
, pp. 275-288
-
-
Kaliski, B.S.1
-
21
-
-
35048820669
-
On the Integration of Watermarks and Cryptography
-
S. Katzenbeisser. On the Integration of Watermarks and Cryptography. Proc. IWDW ’03, LNCS 2939, pp. 50-60, 2003.
-
(2003)
Proc. IWDW ’03, LNCS 2939
, pp. 50-60
-
-
Katzenbeisser, S.1
-
22
-
-
35048854202
-
Cryptanalysis and Improvement of Password-Authenticated Key Exchange Scheme between Clients with Different Passwords
-
J. Kim, S. Kim, J. Kwak, and D. Won. Cryptanalysis and Improvement of Password-Authenticated Key Exchange Scheme between Clients with Different Passwords. Proc. ICCSA ’04, LNCS 3043, pp. 895-902, 2004.
-
(2004)
Proc. ICCSA ’04, LNCS 3043
, pp. 895-902
-
-
Kim, J.1
Kim, S.2
Kwak, J.3
Won, D.4
-
23
-
-
33646720921
-
ID-based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment
-
S. Kim, H. Lee and H. Oh. Enhanced ID-based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. Proc. ICICS ’05, LNCS 3783, pp. 323-336, 2005.
-
(2005)
Proc. ICICS ’05, LNCS 3783
, pp. 323-336
-
-
Kim, S.1
Lee, H.2
Enhanced, H.O.3
-
24
-
-
26444613363
-
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme
-
R.C.-W. Phan and B.-M. Goi. Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Proc. ACNS ’05, LNCS 3531, pp. 33-39, 2005.
-
(2005)
Proc. ACNS ’05, LNCS 3531
, pp. 33-39
-
-
Phan, R.C.-W.1
Goi, B.-M.2
-
25
-
-
33746600612
-
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
-
R.C.-W. Phan and B.-M. Goi. Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Proc. ACNS ’06, LNCS 3989, pp. 226-238, 2006.
-
(2006)
Proc. ACNS ’06, LNCS 3989
, pp. 226-238
-
-
Phan, R.C.-W.1
Goi, B.-M.2
-
26
-
-
35248867842
-
Why Provable Security Matters? Advances in Cryptology - Eurocrypt ’03, LNCS 2656
-
J. Stern. Why Provable Security Matters? Advances in Cryptology - Eurocrypt ’03, LNCS 2656, pp. 449-461, 2003.
-
(2003)
, pp. 449-461
-
-
Stern, J.1
-
27
-
-
35048872322
-
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords
-
S. Wang, J. Wang, and M. Xu. Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Proc. ACNS ’04, LNCS 3089, pp. 414-425, 2004.
-
(2004)
Proc. ACNS ’04, LNCS 3089
, pp. 414-425
-
-
Wang, S.1
Wang, J.2
Xu, M.3
-
28
-
-
33746374068
-
Secure Cross-Realm C2C-PAKE Protocol
-
Y. Yin and L. Bao. Secure Cross-Realm C2C-PAKE Protocol. Proc. ACISP ’06, LNCS 4058, pp. 395-406, 2006.
-
(2006)
Proc. ACISP ’06, LNCS 4058
, pp. 395-406
-
-
Yin, Y.1
Bao, L.2
-
29
-
-
33646746196
-
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity
-
E.-J. Yoon and K.-Y. Yoo. Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. Proc. ICICS ’05, LNCS 3783, pp. 315-322, 2005.
-
(2005)
Proc. ICICS ’05, LNCS 3783
, pp. 315-322
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
|