-
1
-
-
24144443144
-
-
Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, 3376, pp. 191-208. Springer, Heidelberg (2005)
-
Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191-208. Springer, Heidelberg (2005)
-
-
-
-
2
-
-
0031642585
-
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
-
ACM Press, New York
-
Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Proc. of 30th ACM Symposium on Theory of Computing (STOC), pp. 419-428. ACM Press, New York (1998)
-
(1998)
Proc. of 30th ACM Symposium on Theory of Computing (STOC)
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
35048866891
-
-
Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, 2947, pp. 145-158. Springer, Heidelberg (2004)
-
Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145-158. Springer, Heidelberg (2004)
-
-
-
-
4
-
-
0026850091
-
Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks
-
Bellovin, S.M., Merritt, M.: Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 72-84 (1992)
-
(1992)
Proc. of IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proc. of ACM CCS 1993, pp. 62-73 (1993)
-
(1993)
Proc. of ACM
, vol.CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
24144485861
-
-
Chu, C.K., Tzeng, W.G.: Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 172-183. Springer, Heidelberg (2005)
-
Chu, C.K., Tzeng, W.G.: Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172-183. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
1542593353
-
Authentication and Authenticated Key Exchange
-
Diffie, W., van Oorschot, P., Wiener, M.: Authentication and Authenticated Key Exchange. In: Proc. of Designs, Codes, and Cryptography, pp. 107-125 (1992)
-
(1992)
Proc. of Designs, Codes, and Cryptography
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.2
Wiener, M.3
-
11
-
-
38149116508
-
-
http://grouper.ieee.org/groups/1363/passwdPK/submissions.html
-
-
-
-
12
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated DiffieHellman and its Use in the IKE Protocols
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Krawczyk, H.: SIGMA: the 'SIGn-and-MAc' Approach to Authenticated DiffieHellman and its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400-425. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
13
-
-
84937438236
-
Threshold Password-Authenticated Key Exchange
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
MacKenzie, P., Shrimpton, T., Jakobsson, M.: Threshold Password-Authenticated Key Exchange. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 385-400. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 385-400
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
14
-
-
24144502325
-
-
Nguyen, M.H.: The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 457-475. Springer, Heidelberg (2005)
-
Nguyen, M.H.: The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 457-475. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
3042666549
-
On Formal Models for Secure Key Exchange
-
3121, Available at
-
Shoup, V.: On Formal Models for Secure Key Exchange. IBM Research Report RZ 3121, (1999) Available at http://eprint.iacr.org/1999/012
-
(1999)
IBM Research Report RZ
-
-
Shoup, V.1
-
17
-
-
1642489925
-
-
Shoup, V.: OAEP Reconsidered. Journal of Cryptology 15(4), 223-249 (2002)
-
Shoup, V.: OAEP Reconsidered. Journal of Cryptology 15(4), 223-249 (2002)
-
-
-
-
18
-
-
33745142417
-
Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint Archive
-
Report 2004 /332, Available at
-
Shoup, V.: Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint Archive: Report 2004 /332, Available at http://eprint.iacr.org/2004/332
-
-
-
Shoup, V.1
-
19
-
-
84958985031
-
-
Tzeng, W.G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, 2274, pp. 159-171. Springer, Heidelberg (2002)
-
Tzeng, W.G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 159-171. Springer, Heidelberg (2002)
-
-
-
-
20
-
-
33646844820
-
Anonymous Password-Based Authenticated Key Exchange
-
Maitra, S, Madhavan, C.E.V, Venkatesan, R, eds, INDOCRYPT 2005, Springer, Heidelberg
-
Viet, D.Q., Yamamura, A., Tanaka, H.: Anonymous Password-Based Authenticated Key Exchange. In: Maitra, S., Madhavan, C.E.V., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 244-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3797
, pp. 244-257
-
-
Viet, D.Q.1
Yamamura, A.2
Tanaka, H.3
-
21
-
-
38149056771
-
Anonymous Password-Based Authenticated Key Exchange
-
Viet, D.Q., Yamamura, A., Tanaka, H.: Anonymous Password-Based Authenticated Key Exchange. In: Proc. of the 2006 Symposium on Cryptography and Information Security (SCIS 2006), 3D3-4 (January 2006)
-
(2006)
Proc. of the 2006 Symposium on Cryptography and Information Security (SCIS 2006), 3D3-4 (January
-
-
Viet, D.Q.1
Yamamura, A.2
Tanaka, H.3
|