-
1
-
-
0003515822
-
Explicit communication revisited: two new attacks on authentication protocols
-
Abadi M. Explicit communication revisited: two new attacks on authentication protocols. IEEE Transactions on Software Engineering 23 3 (1997) 185-186
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.3
, pp. 185-186
-
-
Abadi, M.1
-
2
-
-
24144491593
-
-
M. Abdalla, P.-A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: Proceedings of the PKC'05, LNCS, vol. 3386, 2005, pp. 65-84.
-
M. Abdalla, P.-A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: Proceedings of the PKC'05, LNCS, vol. 3386, 2005, pp. 65-84.
-
-
-
-
3
-
-
33645734992
-
Password-based authenticated key exchange in the three-party setting
-
Abdalla M., Fouque P.-A., and Pointcheval D. Password-based authenticated key exchange in the three-party setting. IET Information Security 153 1 (2006) 27-39
-
(2006)
IET Information Security
, vol.153
, Issue.1
, pp. 27-39
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
4
-
-
24144443144
-
-
M. Abdalla, D. Pointcheval, Simple password-based encrypted key exchange protocols, in: Proceedings of the CT-RSA'05, LNCS, vol. 3376, 2005, pp. 191-208.
-
M. Abdalla, D. Pointcheval, Simple password-based encrypted key exchange protocols, in: Proceedings of the CT-RSA'05, LNCS, vol. 3376, 2005, pp. 191-208.
-
-
-
-
5
-
-
26444476977
-
-
M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication, in: Proceedings of the FC'05, LNCS, vol. 3570, 2005, pp. 341-356.
-
M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication, in: Proceedings of the FC'05, LNCS, vol. 3570, 2005, pp. 341-356.
-
-
-
-
6
-
-
42649101355
-
-
M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication. Full version of [5] .
-
M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with applications to password-based authentication. Full version of [5] .
-
-
-
-
8
-
-
84945119254
-
-
M. Bellare, P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto'93, LNCS, vol. 773, 1993, pp. 232-249.
-
M. Bellare, P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - Crypto'93, LNCS, vol. 773, 1993, pp. 232-249.
-
-
-
-
9
-
-
42649120131
-
-
M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proceedings of the ACM Symposium on the Theory of Computing (STOC'95), 1995, pp. 57-66.
-
M. Bellare, P. Rogaway, Provably secure session key distribution: the three party case, in: Proceedings of the ACM Symposium on the Theory of Computing (STOC'95), 1995, pp. 57-66.
-
-
-
-
10
-
-
84873466407
-
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Advances in Cryptology - Eurocrypt'00, LNCS, vol. 1807, 2000, pp. 139-155.
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Advances in Cryptology - Eurocrypt'00, LNCS, vol. 1807, 2000, pp. 139-155.
-
-
-
-
11
-
-
0026850091
-
-
S. Bellovin, M. Merritt, Encrypted key exchange: passwords based protocols secure against dictionary attacks, in: Proceedings of the IEEE Symposium on Security and Privacy'92, 1992, pp. 72-84.
-
S. Bellovin, M. Merritt, Encrypted key exchange: passwords based protocols secure against dictionary attacks, in: Proceedings of the IEEE Symposium on Security and Privacy'92, 1992, pp. 72-84.
-
-
-
-
12
-
-
84944063128
-
-
J.W. Byun, I.R. Jeong, D.H. Lee, C.S. Park, Password-authenticated key exchange between clients with different passwords, in: Proceedings of the ICICS'02, LNCS, vol. 2513, 2002, pp. 134-146.
-
J.W. Byun, I.R. Jeong, D.H. Lee, C.S. Park, Password-authenticated key exchange between clients with different passwords, in: Proceedings of the ICICS'02, LNCS, vol. 2513, 2002, pp. 134-146.
-
-
-
-
13
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang C.-C., and Chang Y.-F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.-C.1
Chang, Y.-F.2
-
14
-
-
33646805409
-
-
K.-K.R. Choo, C. Boyd, Y. Hitchcock, Examining indistinguishability-based proof models for key establishment protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 585-604.
-
K.-K.R. Choo, C. Boyd, Y. Hitchcock, Examining indistinguishability-based proof models for key establishment protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 585-604.
-
-
-
-
15
-
-
33646779184
-
-
K.-K.R. Choo, C. Boyd, Y. Hitchcock, Errors in computational complexity proofs for protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 624-643.
-
K.-K.R. Choo, C. Boyd, Y. Hitchcock, Errors in computational complexity proofs for protocols, in: Advances in Cryptology - Asiacrypt'05, LNCS, vol. 3788, 2005, pp. 624-643.
-
-
-
-
16
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
Chung H.-R., and Ku W.-C. Three weaknesses in a simple three-party key exchange protocol. Information Sciences 178 1 (2008) 220-229
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.-R.1
Ku, W.-C.2
-
17
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie W., van Oorschot P.C., and Wiener M.J. Authentication and authenticated key exchanges. Design, Codes and Cryptography 2 2 (1992) 107-125
-
(1992)
Design, Codes and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
van Oorschot, P.C.2
Wiener, M.J.3
-
18
-
-
0002805220
-
Undetectable On-line Password Guessing Attacks
-
Ding Y., and Horster P. Undetectable On-line Password Guessing Attacks. ACM Operating Systems Review 29 4 (1995) 77-86
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
19
-
-
35248830706
-
-
R. Gennaro, Y. Lindell, A framework for password-based authenticated key exchange, in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 524-543.
-
R. Gennaro, Y. Lindell, A framework for password-based authenticated key exchange, in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 524-543.
-
-
-
-
22
-
-
33745766832
-
-
J. Katz, J.S. Shin, Modeling insider attacks on group-key exchange protocols, in: Proceedings of the ACM-CCS'05, 2005, pp. 180-189.
-
J. Katz, J.S. Shin, Modeling insider attacks on group-key exchange protocols, in: Proceedings of the ACM-CCS'05, 2005, pp. 180-189.
-
-
-
-
23
-
-
35048820669
-
-
S. Katzenbeisser, On the Integration of watermarks and cryptography, in: Proceedings of the IWDW'03, LNCS, vol. 2939, 2003, pp. 50-60.
-
S. Katzenbeisser, On the Integration of watermarks and cryptography, in: Proceedings of the IWDW'03, LNCS, vol. 2939, 2003, pp. 50-60.
-
-
-
-
24
-
-
35048854202
-
-
J. Kim, S. Kim, J. Kwak, D. Won, Cryptanalysis and improvement of password-authenticated key exchange scheme between clients with different passwords, in: Proceedings of the ICCSA'04, LNCS, vol. 3043, 2004, pp. 895-902.
-
J. Kim, S. Kim, J. Kwak, D. Won, Cryptanalysis and improvement of password-authenticated key exchange scheme between clients with different passwords, in: Proceedings of the ICCSA'04, LNCS, vol. 3043, 2004, pp. 895-902.
-
-
-
-
25
-
-
33646720921
-
-
S. Kim, H. Lee H. Oh, Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 323-336.
-
S. Kim, H. Lee H. Oh, Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 323-336.
-
-
-
-
26
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T.-F., Hwang T., and Lin C.-L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.-F.1
Hwang, T.2
Lin, C.-L.3
-
27
-
-
0008145442
-
Three party-encrypted key exchange: attacks and a solution
-
Lin C.-L., Sun H.-M., and Hwang T. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.-L.1
Sun, H.-M.2
Hwang, T.3
-
28
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin C.-L., Sun H.-M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
29
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without servers public key
-
Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without servers public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
30
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R., and Cao Z. Simple three-party key exchange protocol. Computers and Security 26 (2007) 94-97
-
(2007)
Computers and Security
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
31
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences 177 6 (2007) 1364-1375
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
32
-
-
33746600612
-
-
R.C.-W. Phan, B.-M. Goi, Cryptanalysis of the N-party encrypted Diffie-Hellman key exchange using different passwords, in: Proceedings of the ACNS'06, LNCS, vol. 3989, 2006, pp. 226-238.
-
R.C.-W. Phan, B.-M. Goi, Cryptanalysis of the N-party encrypted Diffie-Hellman key exchange using different passwords, in: Proceedings of the ACNS'06, LNCS, vol. 3989, 2006, pp. 226-238.
-
-
-
-
33
-
-
37549042706
-
-
R.C.-W. Phan, B.-M. Goi. Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols, in: Proceedings of the Indocrypt'06, LNCS, vol. 4329, 2006, pp. 104-117.
-
R.C.-W. Phan, B.-M. Goi. Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols, in: Proceedings of the Indocrypt'06, LNCS, vol. 4329, 2006, pp. 104-117.
-
-
-
-
34
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun H.-M., Chen B.-C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.-M.1
Chen, B.-C.2
Hwang, T.3
-
36
-
-
35248867842
-
-
J. Stern, Why provable security matters? in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 449-461.
-
J. Stern, Why provable security matters? in: Advances in Cryptology - Eurocrypt'03, LNCS, vol. 2656, 2003, pp. 449-461.
-
-
-
-
37
-
-
33646746196
-
-
E.-J. Yoon, K.-Y. Yoo, Cryptanalysis of two user identification schemes with key distribution preserving anonymity, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 315-322.
-
E.-J. Yoon, K.-Y. Yoo, Cryptanalysis of two user identification schemes with key distribution preserving anonymity, in: Proceedings of the ICICS'05, LNCS, vol. 3783, 2005, pp. 315-322.
-
-
-
|