-
1
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
Financial Cryptography and Data Security - FC 2005 p. 341-56
-
Abdalla M., and Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. Financial Cryptography and Data Security - FC 2005. LNCS vol. 3570 (2005) p. 341-56
-
(2005)
LNCS
, vol.3570
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in Cryptology - CT-RSA 2005, Springer-Verlag p. 191-208
-
Abdalla M., and Pointcheval D. Simple password-based encrypted key exchange protocols. Topics in Cryptology - CT-RSA 2005. LNCS (2005), Springer-Verlag p. 191-208
-
(2005)
LNCS
-
-
Abdalla, M.1
Pointcheval, D.2
-
3
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Public Key Cryptography - PKC 2005 p. 65-84
-
Abdalla M., Fouque P.-A., and Pointcheval D. Password-based authenticated key exchange in the three-party setting. Public Key Cryptography - PKC 2005. LNCS vol. 3386 (2005) p. 65-84
-
(2005)
LNCS
, vol.3386
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
5
-
-
33745677007
-
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol
-
Proceedings of APWeb'06
-
Byun J.W., Lee D.H., and Lim J. Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Proceedings of APWeb'06. LNCS vol. 3841 (2006) 830-836
-
(2006)
LNCS
, vol.3841
, pp. 830-836
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.3
-
6
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
7
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
8
-
-
74549221711
-
An efficient protocol for authenticated key agreement
-
Law L., Menezes A., Qu M., Solinas J., and Vanstone S. An efficient protocol for authenticated key agreement. Designs, Codes and Cryptography 28 2 (March 2003) 119-134
-
(2003)
Designs, Codes and Cryptography
, vol.28
, Issue.2
, pp. 119-134
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
9
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
10
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
11
-
-
0008145442
-
Three party-encrypted key exchange: attacks and a solution
-
Lin C.L., Sun H.M., and Hwang T. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
12
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin C.L., Sun H.M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
13
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R.X., and Cao Z.F. Simple three-party key exchange protocol. Computers and Security 26 (2007) 94-97
-
(2007)
Computers and Security
, vol.26
, pp. 94-97
-
-
Lu, R.X.1
Cao, Z.F.2
-
14
-
-
37549042706
-
Cryptanalysis of Two Provably Secure Cross-realm C2C-PAKE Protocols, INDOCRYPT'06
-
p. 104-17
-
Phan R.C.-W., and Goi B.-M. Cryptanalysis of Two Provably Secure Cross-realm C2C-PAKE Protocols, INDOCRYPT'06. LNCS (2006) p. 104-17
-
(2006)
LNCS
-
-
Phan, R.C.-W.1
Goi, B.-M.2
-
16
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
17
-
-
84971660027
-
Efficient and Provably Secure Generic Construction of Three-party Password-based Authenticated Key Exchange Protocols, INDOCRYPT'06
-
p. 118-32
-
Wang W.J., and Hu L. Efficient and Provably Secure Generic Construction of Three-party Password-based Authenticated Key Exchange Protocols, INDOCRYPT'06. LNCS (2006) p. 118-32
-
(2006)
LNCS
-
-
Wang, W.J.1
Hu, L.2
-
18
-
-
33746374068
-
Secure Cross-Realm C2C-PAKE Protocol
-
Proceedings of ACISP'06
-
Yin Y., and Bao L. Secure Cross-Realm C2C-PAKE Protocol. Proceedings of ACISP'06. LNCS vol. 4058 (2006) 395-406
-
(2006)
LNCS
, vol.4058
, pp. 395-406
-
-
Yin, Y.1
Bao, L.2
|