-
1
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Proc. PKC '05
-
M. Abdalla, P.-A. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Proc. PKC '05, LNCS vol. 3386, pp. 65-84, 2005.
-
(2005)
LNCS
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
2
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
Proc. FC '05
-
M. Abdalla and D. Pointcheval, "Interactive Diffie-Hellman assumptions with applications to password-based authentication," in Proc. FC '05 LNCS vol. 3570, pp. 341-356, 2005.
-
(2005)
LNCS
, vol.3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
3
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Proc. CT-RSA '05
-
M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols," in Proc. CT-RSA '05, LNCS vol. 3376, pp. 191-208, 2005.
-
(2005)
LNCS
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proc. EUROCRYPT '00
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proc. EUROCRYPT '00, LNCS vol. 1807, pp. 139-155, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
Proc. EUROCRYPT '00
-
V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password-authenticated key exchange using Diffie-Hellman," in Proc. EUROCRYPT '00, LNCS vol. 1807, pp. 156-171, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
7
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
H.-R. Chung and W.-C. Ku, "Three weaknesses in a simple three-party key exchange protocol," Inform. Sciences, vol. 178, no. 1, pp. 220-229, 2008.
-
(2008)
Inform. Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.-R.1
Ku, W.-C.2
-
8
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Li, Y. Mu, and X. Zhang, "Cryptanalysis of simple three-party key exchange protocol," Computers & Security, vol. 27, no. 1, pp. 16-21, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.1
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
9
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
Proc. EUROCRYPT '01
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient password-authenticated key exchange using human-memorable passwords," in Proc. EUROCRYPT '01, LNCS vol. 2045, pp. 475-494, 2001.
-
(2001)
LNCS
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
10
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
C.-L. Lin, H.-M. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key exchange without server public-keys," IEEE Commun. Lett., vol. 5, no. 12, pp. 497-499, 2001.
-
(2001)
IEEE Commun. Lett
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
11
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. Lu and Z. Cao, "Simple three-party key exchange protocol," Computers & Security, vol. 26, no. 1, pp. 94-97, 2007.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
12
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
R. C.-W. Phan, W.-C. Yau, and B.-M. Goi, "Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)," Inform. Sciences, vol. 178, no. 13, pp. 2849-2856, 2008.
-
(2008)
Inform. Sciences
, vol.178
, Issue.13
, pp. 2849-2856
-
-
Phan, R.C.-W.1
Yau, W.-C.2
Goi, B.-M.3
-
13
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
J. Steiner, C. Newman, and J. Schiller, "Kerberos: An authentication service for open network systems," in Proc. 1998 USENIX Winter Conference, pp. 191-202, 1998.
-
(1998)
Proc. 1998 USENIX Winter Conference
, pp. 191-202
-
-
Steiner, J.1
Newman, C.2
Schiller, J.3
-
14
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," ACM SIGOPS Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995.
-
(1995)
ACM SIGOPS Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|