-
1
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
ACM Press, New York
-
M. Lomas, L. Gong, J. Saltzer, and R. Needham, "Reducing risks from poorly chosen keys". ACMSymposium on Operating System Principles, ACM Press, New York, 1989, pp. 14-18.
-
(1989)
ACMSymposium on Operating System Principles
, pp. 14-18
-
-
Lomas, M.1
Gong, L.2
Saltzer, J.3
Needham, R.4
-
2
-
-
0026850091
-
Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks
-
IEEE
-
S. M. Bellovin and M. Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks", Proc. of the Symposium on Security and Privacy, IEEE, 1992, pp.72-84.
-
(1992)
Proc. of the Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
3
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
-
ACM Press, New York
-
S. M. Bellovin and M. Merritt, "Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise", Proc. of the 1st CCS,ACM Press, New York, 1993, pp.244-250.
-
(1993)
Proc. of the 1st CCS
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
4
-
-
18744413077
-
The AuthA protocol for password-based authenticated key exchange
-
Mar
-
M. Bellare and P. Rogaway, 'The AuthA protocol for password-based authenticated key exchange", Contributions to IEEE P1363, Mar. 2000.
-
(2000)
Contributions to IEEE P1363
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0036825859
-
Pretty-simple passwordauthenticated key-exchange under standard assumptions
-
Oct, Also available at
-
K. Kobara and H. Imai, "Pretty-simple passwordauthenticated key-exchange under standard assumptions", IEICE Transactions, E85-A(10): 2229-2237, Oct. 2002. Also available at http://eprint.iacr.org/2003/ 038/.
-
(2002)
IEICE Transactions
, vol.E85-A
, Issue.10
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
6
-
-
33645605444
-
The PAK suite: Protocols for passwordauthenticated key exchange
-
P. D. MacKenzie, "The PAK suite: Protocols for passwordauthenticated key exchange", Contributions to IEEE P1363.2, 2002.
-
(2002)
Contributions to IEEE P1363.2
-
-
MacKenzie, P.D.1
-
7
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
ACM Press, Oct
-
E. Bresson, O. Chevassut, and D. Pointcheval, "Security proofs for an efficient password-based key exchange", ACM CCS 03, ACM Press, Oct. 2003.
-
(2003)
ACM CCS 03
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
35048866891
-
New security results on encrypted key exchange, PKC 2004, SpringerVerlag, 2004
-
E. Bresson, O. Chevassut, and D. Pointcheval, "New security results on encrypted key exchange", PKC 2004, SpringerVerlag, 2004, LNCS 2947, pp.145-158.
-
LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
24144443144
-
Simple PasswordBased Encrypted Key Exchange Protocols, Topics in Cryptology - CT-RSA 2005, Springer-Verlag, 2005
-
Michel Abdalla and David Pointcheval, "Simple PasswordBased Encrypted Key Exchange Protocols", Topics in Cryptology - CT-RSA 2005, Springer-Verlag, 2005, LNCS 3376, pp.191-208.
-
LNCS
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
11
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks, EUROCRYPT 2000, Springer-Verlag, 2000
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", EUROCRYPT 2000, Springer-Verlag, 2000, LNCS 1807, pp. 139-155.
-
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
|