-
1
-
-
0028446389
-
Fortifying key negotiation schemes with poorly chosen passwords
-
June
-
R. J. Anderson and T. M. A. Lomas. Fortifying key negotiation schemes with poorly chosen passwords. Electronics Letters, 30(13):1040-1041, June 1994.
-
(1994)
Electronics Letters
, vol.30
, Issue.13
, pp. 1040-1041
-
-
Anderson, R. J.1
Lomas, T. M. A.2
-
3
-
-
35048868910
-
On password-based authenticated key exchange using collisionful hash functions
-
Springer-Verlag, Berlin Germany
-
S. Bakhtiari, R. Safavi-Naini, and J. Pieprzyk. On password-based authenticated key exchange using collisionful hash functions. In 1st Australasian Conference on Information Security and Privacy (ACISP '96), number 1172 in Lecture Notes in Computer Science, pages 299-310. Springer-Verlag, Berlin Germany, 1996.
-
(1996)
1st Australasian Conference on Information Security and Privacy (ACISP '96), number 1172 in Lecture Notes in Computer Science
, pp. 299-310
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
5
-
-
35048823135
-
Random oracles are practical: A pardigm for designing efficient protocols
-
Ashby [2]. also appeared (in identical form) as IBM RC 19619 (87000) 6/22/94
-
M. Bellare and P. Rogaway. Random oracles are practical: A pardigm for designing efficient protocols. In Ashby [2]. also appeared (in identical form) as IBM RC 19619 (87000) 6/22/94.
-
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
84948986458
-
Optimal asymmetric encryption - how to encrypt with RSA
-
I. Damgard, editor, pages Springer-Verlag, Berlin Germany, Final (revised) version appeared November 19, 1995
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with RSA. In I. Damgard, editor, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, pages 92-111. Springer-Verlag, Berlin Germany, 1994. Final (revised) version appeared November 19, 1995.
-
(1994)
Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
85180785462
-
Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise
-
S. Bellovin and M. Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise. In Ashby [2], pages 244-250.
-
Ashby
, Issue.2
, pp. 244-250
-
-
Bellovin, S.1
Merrit, M.2
-
9
-
-
0011716691
-
Limitations of the Kerberos authentication system
-
Dallas, TX, Winter USENIX. An earlier version of this paper was published in the October, 1990 of Computer Communications Review
-
S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. In USENIX Conference Proceedings, pages 253-267, Dallas, TX, Winter 1991. USENIX. An earlier version of this paper was published in the October, 1990 issue of Computer Communications Review.
-
(1991)
USENIX Conference Proceedings
, pp. 253-267
-
-
Bellovin, S. M.1
Merritt, M.2
-
10
-
-
0003415244
-
-
Jan
-
T. Berners-Lee, R. T. Fielding, H. F. Nielsen, J. Gettys, and J. Mogul. Hypertext transfer protocol - HTTP/1.1. Internet Request for Comment RFC 2068, Jan. 1997.
-
(1997)
Hypertext transfer protocol - HTTP/1.1. Internet Request for Comment RFC 2068
-
-
Berners-Lee, T.1
Fielding, R. T.2
Nielsen, H. F.3
Gettys, J.4
Mogul, J.5
-
11
-
-
0029238493
-
Improving system security via proactive password checking
-
M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.3
, pp. 233-249
-
-
Bishop, M.1
Klein, D. V.2
-
12
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs
-
H. Krawczyk, editor, pages Springer-Verlag, Berlin Germany, Aug
-
D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, number 1462 in Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, Berlin Germany, Aug. 1998.
-
(1998)
Advances in Cryptology - CRYPTO '98, number 1462 in Lecture Notes in Computer Science
, pp. 1-12
-
-
Bleichenbacher, D.1
-
16
-
-
85024271331
-
Protecting poorly chosen secrets from guessing attacks
-
The Wigwam, Litchfield Park, Arizona, Dec. A revised journal version appeared as [17]
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer. Protecting poorly chosen secrets from guessing attacks. In Proceedings of the Twelth ACM Symposium on Operating Systems Principles. The Wigwam, Litchfield Park, Arizona, Dec. 1989. A revised journal version appeared as [17].
-
(1989)
Proceedings of the Twelth ACM Symposium on Operating Systems Principles
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
17
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
June
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
18
-
-
0032218224
-
Public-key cryptography and password protocols
-
San Francisco, California, Nov. ACM Press. Revised version available as Theory of Cryptography Library: Record 99-04
-
S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. In 5th ACM Conference on Computer and Communications Security, San Francisco, California, Nov. 1998. ACM Press. Revised version available as Theory of Cryptography Library: Record 99-04.
-
(1998)
5th ACM Conference on Computer and Communications Security
-
-
Halevi, S.1
Krawczyk, H.2
-
19
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Sep
-
D. P. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, 26(5):5-26, Sep 1996.
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D. P.1
-
21
-
-
0038126042
-
-
Technical report, RSA Laboratories, Sept. Version 2.0. Published in October 1998 as Internet RFC 2437
-
B. Kaliski and J. Staddon. PKCS #1: RSA cryptography specifications. Technical report, RSA Laboratories, Sept. 1998. Version 2.0. Published in October 1998 as Internet RFC 2437.
-
(1998)
PKCS #1: RSA cryptography specifications
-
-
Kaliski, B.1
Staddon, J.2
-
23
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
B. S. K. Jr., editor, pages Springer-Verlag, Berlin Germany, Aug
-
C. H. Lim and P. J. Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, number 1294 in Lecture Notes in Computer Science, pages 249-263. Springer-Verlag, Berlin Germany, Aug. 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97, number 1294 in Lecture Notes in Computer Science
, pp. 249-263
-
-
Lim, C. H.1
Lee, P. J.2
-
24
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
Ecole Normale Suprieure, Paris, Apr
-
S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Security Protocol Workshop'97, Ecole Normale Suprieure, Paris, Apr. 1997.
-
(1997)
Security Protocol Workshop'97
-
-
Lucks, S.1
-
25
-
-
0029325653
-
Fast generation of prime numbers and secure public-key cryptographic parameters
-
U. M. Maurer. Fast generation of prime numbers and secure public-key cryptographic parameters. Journal of Cryptology, 8(3):123-155, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.3
, pp. 123-155
-
-
Maurer, U. M.1
-
26
-
-
85180738523
-
Addition of kerberos cipher suites to transport layer security (TLS)
-
Aug. Expires January 22, 2000
-
A. Medvinsky and M. Hur. Addition of kerberos cipher suites to transport layer security (TLS). Internet Draft, Aug. 1999. Expires January 22, 2000.
-
(1999)
Internet Draft
-
-
Medvinsky, A.1
Hur, M.2
-
29
-
-
0018543411
-
Password security: A case history
-
Nov
-
R. Morris and K. Thompson. Password security: A case history. Commun. ACM, 22(11), Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
-
-
Morris, R.1
Thompson, K.2
-
30
-
-
0030648441
-
Number theoretic attacks on secure password schemes
-
Oakland, CA, May IEEE Computer Society Press
-
S. Patel. Number theoretic attacks on secure password schemes. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, pages 236-247, Oakland, CA, May 1997. IEEE Computer Society Press.
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy
, pp. 236-247
-
-
Patel, S.1
-
31
-
-
85180787075
-
-
RSA. Technical report, RSA Laboratories, Feb. Version 2.0; Third Draft
-
RSA. PKCS #5: Password-based encryption standard. Technical report, RSA Laboratories, Feb. 1999. Version 2.0; Third Draft.
-
(1999)
PKCS #5: Password-based encryption standard
-
-
-
32
-
-
33645607716
-
Why chosen ciphertext security matters
-
Research Report RZ 3076 (#93122), IBM Research, Nov
-
V. Shoup. Why chosen ciphertext security matters. Research Report RZ 3076 (#93122), IBM Research, Nov. 1998.
-
(1998)
-
-
Shoup, V.1
-
33
-
-
0004023090
-
On formal models for secure key exchange
-
Research Report RZ 3120 (#93166), IBM Research, Apr
-
V. Shoup. On formal models for secure key exchange. Research Report RZ 3120 (#93166), IBM Research, Apr. 1999.
-
(1999)
-
-
Shoup, V.1
-
34
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
July
-
M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM Operating Systems Review, 29(3):22-30, July 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
36
-
-
85180527787
-
The secure remote password protocol
-
San Diego, California, Mar. Internet Society
-
T. Wu. The secure remote password protocol. In Symposium on Network and Distributed Systems Security (NDSS '98), pages 97-111, San Diego, California, Mar. 1998. Internet Society.
-
(1998)
Symposium on Network and Distributed Systems Security (NDSS '98)
, pp. 97-111
-
-
Wu, T.1
|