-
1
-
-
36349014859
-
A new method for using hash functions to solve remote user authentication
-
Chen T.H., and Lee W.B. A new method for using hash functions to solve remote user authentication. Comput Electr Eng 34 1 (2008) 53-62
-
(2008)
Comput Electr Eng
, vol.34
, Issue.1
, pp. 53-62
-
-
Chen, T.H.1
Lee, W.B.2
-
2
-
-
22644442489
-
Password authenticated key exchange protocols among diverse network domains
-
Yeh H.T., and Sun H.M. Password authenticated key exchange protocols among diverse network domains. Comput Electr Eng 31 3 (2005) 175-189
-
(2005)
Comput Electr Eng
, vol.31
, Issue.3
, pp. 175-189
-
-
Yeh, H.T.1
Sun, H.M.2
-
3
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operat Syst Rev 29 4 (1995) 77-86
-
(1995)
ACM Operat Syst Rev
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
4
-
-
0026850091
-
-
Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE symposium on research in security and privacy; 1992. p. 72-84.
-
Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE symposium on research in security and privacy; 1992. p. 72-84.
-
-
-
-
5
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Comput Secur 23 7 (2004) 571-577
-
(2004)
Comput Secur
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
6
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using weil pairing
-
Wen H.A., Lee T.F., and Hwang T. Provably secure three-party password-based authenticated key exchange protocol using weil pairing. IEE Proc Commun 152 2 (2005) 138-143
-
(2005)
IEE Proc Commun
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
7
-
-
0027726717
-
-
Bellare M, Rogaway P. Random oracles arepractical: a paradigm for designing efficient protocols. In: Proceedings of the first ACM annual conference on computer and communications security; 1993. p. 62-73.
-
Bellare M, Rogaway P. Random oracles arepractical: a paradigm for designing efficient protocols. In: Proceedings of the first ACM annual conference on computer and communications security; 1993. p. 62-73.
-
-
-
-
8
-
-
84945119254
-
-
Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of the Crypto 93, LNCS, vol. 773; 1993. p. 232-49.
-
Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of the Crypto 93, LNCS, vol. 773; 1993. p. 232-49.
-
-
-
-
9
-
-
58049195717
-
-
Bellare M, Rogaway P. Provably secure session key distribution: the three party case. In: Proceedings of the 27th ACM symposium on the theory of computing; 1995. p. 57-66.
-
Bellare M, Rogaway P. Provably secure session key distribution: the three party case. In: Proceedings of the 27th ACM symposium on the theory of computing; 1995. p. 57-66.
-
-
-
-
10
-
-
84873466407
-
-
Bellare M, Pointcheval P, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Proceedings of the Eurocrypt'00, LNCS, vol. 1807; 2000. p. 139-55.
-
Bellare M, Pointcheval P, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Proceedings of the Eurocrypt'00, LNCS, vol. 1807; 2000. p. 139-55.
-
-
-
-
11
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Lee Y., Kim S., and Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inform Sci 177 6 (2007) 1364-1375
-
(2007)
Inform Sci
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
12
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R., and Cao Z. Simple three-party key exchange protocol. Comput Secur 26 1 (2007) 94-97
-
(2007)
Comput Secur
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
13
-
-
33751229614
-
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
-
Shim K., and Woo S.S. Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. Inform Sci 177 4 (2007) 1143-1151
-
(2007)
Inform Sci
, vol.177
, Issue.4
, pp. 1143-1151
-
-
Shim, K.1
Woo, S.S.2
-
14
-
-
24144443144
-
-
Abdalla M, Pointcheval D. Simple password-based encrypted key exchange protocols. In: Proceedings of the CT-RSA'05, LNCS, vol. 3376; 2005. p. 191-208.
-
Abdalla M, Pointcheval D. Simple password-based encrypted key exchange protocols. In: Proceedings of the CT-RSA'05, LNCS, vol. 3376; 2005. p. 191-208.
-
-
-
-
15
-
-
34447321042
-
EC2C-PAKA: an efficient client-to-client password-authenticated key agreement
-
10.1016/j.ins.2007.03.24
-
Byun J.W., Lee D.H., and Lim J.I. EC2C-PAKA: an efficient client-to-client password-authenticated key agreement. Inform Sci (2007) 10.1016/j.ins.2007.03.24
-
(2007)
Inform Sci
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.I.3
-
16
-
-
18444399366
-
Simple authenticated key agreement and protected password change protocol
-
Chang T.Y., Yang W.P., and Hwang M.S. Simple authenticated key agreement and protected password change protocol. Comput Math Appl 49 5-6 (2005) 703-714
-
(2005)
Comput Math Appl
, vol.49
, Issue.5-6
, pp. 703-714
-
-
Chang, T.Y.1
Yang, W.P.2
Hwang, M.S.3
-
17
-
-
33747171940
-
The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols
-
Choo K.K.R., Boyd C., and Hitchcock Y. The importance of proofs of security for key establishment protocols: formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Comput Commun 29 15 (2006) 2788-2797
-
(2006)
Comput Commun
, vol.29
, Issue.15
, pp. 2788-2797
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
18
-
-
10444279176
-
Provably secure three-party password-authenticated key exchange
-
Lin C.L., Wen H.A., Hwang T., and Sun H.M. Provably secure three-party password-authenticated key exchange. IEICE Trans Fundam Electr Commun Comput Sci E87-A 11 (2004) 2990-3000
-
(2004)
IEICE Trans Fundam Electr Commun Comput Sci
, vol.E87-A
, Issue.11
, pp. 2990-3000
-
-
Lin, C.L.1
Wen, H.A.2
Hwang, T.3
Sun, H.M.4
-
19
-
-
33644748254
-
Provably secure authenticated key exchange protocols for low power computing clients
-
Wen H.A., Lin C.L., and Hwang T. Provably secure authenticated key exchange protocols for low power computing clients. Comput Secur 25 2 (2006) 106-113
-
(2006)
Comput Secur
, vol.25
, Issue.2
, pp. 106-113
-
-
Wen, H.A.1
Lin, C.L.2
Hwang, T.3
|