-
1
-
-
84957629783
-
Relations among Notations of Security for Public Key Encryption Schemes
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notations of Security for Public Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0001940580
-
Provably Secure Session Key Distribution: The Three Party Case
-
ACM Press, New York
-
Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: 27th ACM Symp. on the Theory of Comput., pp. 57-66. ACM Press, New York (1995)
-
(1995)
27th ACM Symp. on the Theory of Comput
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
2342566530
-
A Novel Three-Party Encrypted Key Exchange Protocol
-
Chang, C.C., Chang, Y.F.: A Novel Three-Party Encrypted Key Exchange Protocol. Computer Standards and Interfaces 26(5), 471-476 (2004)
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
5
-
-
46749107236
-
Selectively Convertible Authenticated Encryption in The Random Oracle Model
-
January 17, doi:10.1093/comjnl/bxm090
-
Chien, H.Y.: Selectively Convertible Authenticated Encryption in The Random Oracle Model. The Computer Journal (January 17, 2008) (2008) doi:10.1093/comjnl/bxm090
-
(2008)
The Computer Journal
-
-
Chien, H.Y.1
-
6
-
-
34948903343
-
Three Weaknesses in a Simple Three-Party Key Exchange Protocol
-
Chung, H.R., Ku, W.C.: Three Weaknesses in a Simple Three-Party Key Exchange Protocol. Information Sciences 178(1), 220-229 (2008)
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
7
-
-
0002805220
-
Undetectable On-Line Password Guessing Attacks
-
Ding, Y., Horster, P.: Undetectable On-Line Password Guessing Attacks. ACM Operating Systems Review 29(4), 77-86 (1995)
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
9
-
-
33646469746
-
Weaknesses of Yoon-Ryu-Yoo's Hash-Based Password Authentication Scheme
-
Ku, W.C., Chiang, M.H., Chang, S.T.: Weaknesses of Yoon-Ryu-Yoo's Hash-Based Password Authentication Scheme. ACM Operating Systems Review 39(1), 85-89 (2005)
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 85-89
-
-
Ku, W.C.1
Chiang, M.H.2
Chang, S.T.3
-
10
-
-
8344221264
-
Enhanced Three-Party Encrypted Key Exchange without Server Public Keys
-
Lee, T.F., Hwang, T., Lin, C.L.: Enhanced Three-Party Encrypted Key Exchange without Server Public Keys. Computers and Security 23(7), 571-577 (2004)
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
11
-
-
0008145442
-
Three Party-Encrypted Key Exchange: Attacks and a Solution
-
Lin, C.L., Sun, H.M., Hwang, T.: Three Party-Encrypted Key Exchange: Attacks and a Solution. ACM Operating System Review 34(4), 12-20 (2000)
-
(2000)
ACM Operating System Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
12
-
-
0035701459
-
Three-Party Encrypted Key Exchange without Server Public-Keys
-
Lin, C.L., Sun, H.M., Steiner, M., Hwang, T.: Three-Party Encrypted Key Exchange without Server Public-Keys. IEEE Commun. Lett. 5(12), 497-499 (2001)
-
(2001)
IEEE Commun. Lett
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
13
-
-
33846817471
-
Simple Three-Party Key Exchange Protocol
-
Lu, R., Cao, Z.: Simple Three-Party Key Exchange Protocol. Computers Security 26(1), 94-97 (2007)
-
(2007)
Computers Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
14
-
-
21144468597
-
KryptoKnight Authentication and Key Distribution System
-
Deswarte, Y, Quisquater, J.-J, Eizenberg, G, eds, ESORICS 1992, Springer, Heidelberg
-
Molva, R., Tsudik, G., Van Herreweghen, E., Zatti, S.: KryptoKnight Authentication and Key Distribution System. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol. 648, pp. 1-16. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.648
, pp. 1-16
-
-
Molva, R.1
Tsudik, G.2
Van Herreweghen, E.3
Zatti, S.4
-
15
-
-
32244432466
-
Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Trans. on Fund. of Electronics, Communications and Computer Sciences
-
E89-A1
-
Nam, J., Kim, S., Won, D.: Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Trans. on Fund. of Electronics, Communications and Computer Sciences E89-A(1), 209-212 (2006)
-
(2006)
, pp. 209-212
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
16
-
-
0002839106
-
Refinement and Extension of Encrypted Key Exchange
-
Steiner, M., Tsudik, G., Wainder, M.: Refinement and Extension of Encrypted Key Exchange. ACM Operation Systems Review 29(3), 22-30 (1995)
-
(1995)
ACM Operation Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Wainder, M.3
-
17
-
-
9544230689
-
Secure Key Agreement Protocols for Three-Party against Guessing Attacks
-
Sun, H.M., Chen, B.C., Hwang, T.: Secure Key Agreement Protocols for Three-Party against Guessing Attacks. The Journal of Systems and Software 75, 63-68 (2005)
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
18
-
-
12844274508
-
Note on Robust and Simple Authentication Protocol
-
Chien, H. Y., Wang, R.C., Yang, C.C.: Note on Robust and Simple Authentication Protocol. The Computer Journal 48(1), 27-29 (2005)
-
(2005)
The Computer Journal
, vol.48
, Issue.1
, pp. 27-29
-
-
Chien, H.Y.1
Wang, R.C.2
Yang, C.C.3
-
20
-
-
0029531472
-
Optimal Authentication Protocols Resistant to Password Guessing Attacks
-
Gong, L.: Optimal Authentication Protocols Resistant to Password Guessing Attacks. In: The 8th IEEE Workshop on Computer Security Foundations, p. 24 (1995)
-
(1995)
The 8th IEEE Workshop on Computer Security Foundations
, pp. 24
-
-
Gong, L.1
|