-
1
-
-
24144491593
-
Password-Based Authenticated Key Exchange in the Three-Party Setting
-
Serge Vaudenay, editor, Public Key Cryptography, PKC 2005, of, Springer
-
Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. In Serge Vaudenay, editor, Public Key Cryptography - PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 65-84. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
2
-
-
33645734992
-
Password-Based Authenticated Key Exchange in the Three-Party Setting
-
March
-
Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. IEE Proceedings - Information Security, 153(1):27-39, March 2006.
-
(2006)
IEE Proceedings - Information Security
, vol.153
, Issue.1
, pp. 27-39
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
3
-
-
84873466407
-
Authenticated Key Exchange Secure Against Dictionary Attacks
-
Bart Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Springer
-
Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 139-155. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entitiy Authentication and Key Distribution
-
Douglas R. Stinson, editor, Advances in Cryptology, CRYPTO '93, of, Springer
-
Mihir Bellare and Phillip Rogaway. Entitiy Authentication and Key Distribution. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93, volume 773 of Lecture Notes in Computer Science, pages 232-249. Springer, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
38049015591
-
Cryptology ePrint Archive
-
Secure Group Key Establishment Revisited, Report 2005/395, Available at
-
Jens-Matthias Bohli, Maria Isabel González Vasco, and Rainer Steinwandt. Secure Group Key Establishment Revisited. Cryptology ePrint Archive, Report 2005/395, 2005. Available at http://eprint.iacr.org/2005/395/.
-
(2005)
-
-
Bohli, J.1
Isabel, M.2
Vasco, G.3
Steinwandt, R.4
-
6
-
-
38049090890
-
Vasco, and Rainer Steinwandt. Password-Authenticated Const ant-Round Group Key Establishment with a Common Reference String . Cryptology ePrint Archive
-
Report 2006/214, Available at
-
Jens-Matthias Bohli, Maria Isabel González Vasco, and Rainer Steinwandt. Password-Authenticated Const ant-Round Group Key Establishment with a Common Reference String . Cryptology ePrint Archive: Report 2006/214, 2006. Available at http://eprint.iacr.org/2006/214.
-
(2006)
-
-
Bohli, J.1
Isabel González, M.2
-
7
-
-
84937550984
-
Key Exchange Using Diffie-Hellman
-
Bart Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Springer
-
Victor Boyko, Philip D. MacKenczie, and Sarvar Patel. Provable-Secure PasswordAuthenticated Key Exchange Using Diffie-Hellman. In Bart Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, pages 156-171. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenczie, P.D.2
Patel, S.3
PasswordAuthenticated, P.4
-
8
-
-
84948991087
-
-
editor, Springer
-
Mike Burmester and Yvo Desmedt. A Secure and Efficient Conference Key Distribution System. In Alfredo De Santis, editor, Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science, pages 275-286. Springer, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT'94, volume 950 of Lecture Notes in Computer Science, A Secure and Efficient Conference Key Distribution System
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
9
-
-
84978999296
-
Efficient and Secure Conference-Key Distribution
-
T. Mark A. Lomas, editor, Proceedings of the International Workshop on Security Protocols, of, Springer
-
Mike Burmester and Yvo G. Desmedt. Efficient and Secure Conference-Key Distribution. In T. Mark A. Lomas, editor, Proceedings of the International Workshop on Security Protocols, volume 1189 of Lecture Notes in Computer Science, pages 119-129. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1189
, pp. 119-129
-
-
Burmester, M.1
Desmedt, Y.G.2
-
10
-
-
24944566824
-
Universally Composable Password-Based Key Exchange
-
Ronald Cramer, editor, Advances in Cryptology, EUROCRYPT 2005, of, Springer
-
Ran Canetti, Shai Halevi, Jonathan Katz, Yehuda Lindell, and Philip MacKenzie. Universally Composable Password-Based Key Exchange. In Ronald Cramer, editor, Advances in Cryptology - EUROCRYPT 2005, volume 3495 of Lecture Notes in Computer Science, pages 404-421. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3495
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
11
-
-
35048860626
-
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
-
Birgit Pfitzmann, editor, Advances in Cryptology, EUROCRYPT 2001, of, Springer
-
Ran Canetti and Hugo Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 453-474. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
12
-
-
0343337504
-
Non-Malleable Cryptography
-
Danny Dolev, Cynthia Dwork, and Moni Naor. Non-Malleable Cryptography. SIAM Journal of Computing, 30(2):391-437, 2000.
-
(2000)
SIAM Journal of Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
14
-
-
24144468439
-
A Framework for Password-Based Authenticated Key Exchange. Cryptology ePrint Archive
-
Report 2003/032, Available at
-
Rosario Gennaro and Yehuda Lindell. A Framework for Password-Based Authenticated Key Exchange. Cryptology ePrint Archive: Report 2003/032, 2003. Available at http ://eprint.iacr.org/2003/032.
-
(2003)
-
-
Gennaro, R.1
Lindell, Y.2
-
15
-
-
35248830706
-
A Framework for Password-Based Authenticated Key Exchange (Extended Abstract)
-
Eli Biham, editor, Advances in Cryptology, EUROCRYPT 2003, of, Springer
-
Rosario Gennaro and Yehuda Lindell. A Framework for Password-Based Authenticated Key Exchange (Extended Abstract). In Eli Biham, editor, Advances in Cryptology - EUROCRYPT 2003, volume 2656 of Lecture Notes in Computer Science, pages 524-543. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
16
-
-
84880888233
-
Session-key generation using human passwords only
-
London, UK, Springer-Verlag
-
Oded Goldreich and Yehuda Lindell. Session-key generation using human passwords only. In Advances in Cryptology - CRYPTO '01, pages 408-432, London, UK, 2001. Springer-Verlag.
-
(2001)
Advances in Cryptology - CRYPTO '01
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
17
-
-
3042683481
-
Scalable key exchange transformation: From two-party to group
-
Jung Yeon Hwang, Su-Mi Lee, and Dong Hoon Lee. Scalable key exchange transformation: from two-party to group. Electronic Letters, 40(12):728-729, 2004.
-
(2004)
Electronic Letters
, vol.40
, Issue.12
, pp. 728-729
-
-
Yeon, J.1
Hwang, S.-M.L.2
Hoon Lee, D.3
-
18
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Birgit Pfitzmann, editor, Advances in Cryptology, EUROCRYPT 2001, of, Springer
-
Jonathan Katz, Rafail Ostrovsky, and Moti Yung. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 475-494. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
19
-
-
35248831117
-
Forward Secrecy in Password-Only Key Exchange Protocols
-
Stelvio Cimato, Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks: Third International Conference, SCN 2002, of, Springer
-
Jonathan Katz, Rafail Ostrovsky, and Moti Yung. Forward Secrecy in Password-Only Key Exchange Protocols. In Stelvio Cimato, Clemente Galdi, and Giuseppe Persiano, editors, Security in Communication Networks: Third International Conference, SCN 2002, volume 2576 of Lecture Notes in Computer Science, pages 29-44. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2576
, pp. 29-44
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
21
-
-
38049090083
-
Cryptology ePrint Archive
-
Modeling Insider Attacks on Group Key-Exchange Protocols, Report 2005/163, Available at
-
Jonathan Katz and Ji Sun Shin. Modeling Insider Attacks on Group Key-Exchange Protocols. Cryptology ePrint Archive: Report 2005/163, 2005. Available at http://eprint.iacr.org/2005/163.
-
(2005)
-
-
Katz, J.1
Sun Shin, J.2
-
22
-
-
77954613404
-
A High-Performance Secure Diffie-Hellman Protocol. Cryptology ePrint Archive
-
Report 2005/176, Available at
-
Hugo Kawczyck. HMQV: A High-Performance Secure Diffie-Hellman Protocol. Cryptology ePrint Archive: Report 2005/176, 2005. Available at http ://eprint.iacr.org/2005/176.
-
(2005)
-
-
Hugo Kawczyck, H.M.Q.V.1
-
23
-
-
33745179557
-
A High-Performance Secure Diffie-Hellman Protocol
-
Victor Shoup, editor, Advances in Cryptology, CRYPTO '05, of, Springer
-
Hugo Krawczyck. HMQV: A High-Performance Secure Diffie-Hellman Protocol. In Victor Shoup, editor, Advances in Cryptology - CRYPTO '05, volume 3621 of Lecture Notes in Computer Science, pages 546-566. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 546-566
-
-
Hugo Krawczyck, H.M.Q.V.1
-
24
-
-
35048828834
-
Efficient Password-Based Group Key Exchange
-
Sokratis Katsikas, Javier Lopez, and Günther Pernul, editors, Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, of, Springer
-
Su Mi Lee, Jung Yeon Hwang, and Dong Hoon Lee. Efficient Password-Based Group Key Exchange. In Sokratis Katsikas, Javier Lopez, and Günther Pernul, editors, Trust and Privacy in Digital Business: First International Conference, TrustBus 2004, volume 3184 of Lecture Notes in Computer Science, pages 191-199. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3184
, pp. 191-199
-
-
Lee, S.M.1
Yeon Hwang, J.2
Hoon Lee, D.3
-
26
-
-
85022144916
-
Another look at HMQV. Cryptology ePrint Archive
-
Report 2005/205, Available at
-
Alfred Menezes. Another look at HMQV. Cryptology ePrint Archive: Report 2005/205, 2005. Available at http://eprint.iacr.org/2005/205.
-
(2005)
-
-
Menezes, A.1
-
27
-
-
0007441727
-
Some new key agreement protocols providing mutual implicit authentication
-
July
-
Alfred Menezes, Minghua Qu, and Scott A. Vanstone. Some new key agreement protocols providing mutual implicit authentication. In Workshop on Selected Areas in Cryptography, pages 22-32, July 1995.
-
(1995)
Workshop on Selected Areas in Cryptography
, pp. 22-32
-
-
Menezes, A.1
Qu, M.2
Vanstone, S.A.3
-
28
-
-
33746630828
-
Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks
-
ACNS, of, Springer
-
Qiang Tang and Kim-Kwang Raymond Choo. Secure password-based authenticated group key agreement for data-sharing peer-to-peer networks. In ACNS, volume 3989 of Lecture Notes in Computer Science, pages 162-177. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3989
, pp. 162-177
-
-
Tang, Q.1
Raymond Choo, K.2
|