-
1
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols," Proc. CT-RSA 2005, LNCS 3376, pp.191- 208, Springer-Verlag, 2005. (Pubitemid 41231212)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
0031642585
-
A modular approach tothe design and analysis of authentication and key exchange protocols
-
ACM
-
M. Bellare, R. Canetti, and H. Krawczyk, "A modular approach tothe design and analysis of authentication and key exchange protocols," Proc. 30th ACM Symposium on Theory of Computing (STOC), pp.419-428, ACM, 1998.
-
(1998)
Proc. 30th ACM Symposium on Theory of Computing (STOC)
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
35048866891
-
New security results on encrypted key exchange
-
Springer-Verlag
-
E. Bresson, O. Chevassut, and D. Pointcheval, "New security results on encrypted key exchange," Proc. PKC 2004, LNCS 2947, pp.145- 158, Springer-Verlag, 2004.
-
(2004)
Proc. PKC 2004, LNCS 2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
4
-
-
0026850091
-
Encrypted key exchange: Passwordbased protocols secure against dictionary attacks
-
S.M. Bellovin and M. Merritt, "Encrypted key exchange: Passwordbased protocols secure against dictionary attacks," Proc. IEEE Symposium on Security and Privacy, pp.72-84, 1992.
-
(1992)
Proc. IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Proc. EUROCRYPT 2000, LNCS 1807, pp.139-155, Springer-Verlag, 2000.
-
(2000)
Proc. EUROCRYPT 2000, LNCS 1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
6
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," Proc. ACM CCS'93, pp.62-73, 1993.
-
(1993)
Proc. ACM CCS'93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
Springer-Verlag
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution," Proc. CRYPTO'93, LNCS 773, pp.232-249, Springer-Verlag, 1993.
-
(1993)
Proc. CRYPTO'93, LNCS 773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
24144485861
-
Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
-
Springer-Verlag
-
C.K. Chu and W.G. Tzeng, "Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries," Proc. PKC 2005, LNCS 3386, pp.172-183, Springer-Verlag, 2005.
-
Proc. PKC 2005, LNCS 3386
, vol.2005
, pp. 172-183
-
-
Chu, C.K.1
Tzeng, W.G.2
-
9
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol.IT-22, no.6, pp.644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
10
-
-
1542593353
-
Authentication and authenticated key exchange
-
W. Diffie, P. van Oorschot, and M. Wiener, "Authentication and authenticated key exchange," Proc. Designs, Codes, and Cryptography, pp.107-125, 1992.
-
(1992)
Proc. Designs, Codes, and Cryptography
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
11
-
-
85027123886
-
-
http://grouper.ieee.org/groups/1363/passwdPK/submissions.htm
-
-
-
-
12
-
-
35248816546
-
SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols
-
Springer-Verlag
-
H. Krawczyk, "SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols," Proc. CRYPTO 2003, LNCS 2729, pp.400-425, Springer-Verlag, 2003.
-
(2003)
Proc. CRYPTO 2003, LNCS 2729
, pp. 400-425
-
-
Krawczyk, H.1
-
13
-
-
84937438236
-
Threshold password-authenticated key exchange
-
Springer-Verlag
-
P. MacKenzie, T. Shrimpton, and M. Jakobsson, "Threshold password-authenticated key exchange," Proc. CRYPTO 2002, LNCS 2442, pp.385-400, Springer-Verlag, 2002.
-
(2002)
Proc. CRYPTO 2002, LNCS 2442
, pp. 385-400
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
14
-
-
24144502325
-
The relationship between password-authenticated key exchange and other cryptographic primitives
-
Springer-Verlag
-
M.H. Nguyen, "The relationship between password-authenticated key exchange and other cryptographic primitives," Proc. TCC 2005, LNCS 3378, pp.457-475, Springer-Verlag, 2005.
-
(2005)
Proc. TCC 2005, LNCS 3378
, pp. 457-475
-
-
Nguyen, M.H.1
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Proc. Commun. ACM, vol.22, no.11, pp.612-613, 1979.
-
(1979)
Proc. Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0004023090
-
On formal models for secure key exchange
-
Available at
-
V. Shoup, "On formal models for secure key exchange," IBM Research Report RZ 3121, 1999. Available at http://eprint.iacr.org/ 1999/012
-
(1999)
IBM Research Report RZ 3121
-
-
Shoup, V.1
-
17
-
-
1642489925
-
OAEP reconsidered
-
Sept
-
V. Shoup, "OAEP reconsidered," J. Cryptol., vol.15, no.4, pp.223- 249, Sept. 2002.
-
(2002)
J. Cryptol.
, vol.15
, Issue.4
, pp. 223-249
-
-
Shoup, V.1
-
18
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
V. Shoup, "Sequences of games: A tool for taming complexity in security proofs," Cryptology ePrint Archive: Report 2004/332, http://eprint.iacr.org/2004/332
-
Cryptology ePrint Archive: Report 2004/332
-
-
Shoup, V.1
-
19
-
-
38149091550
-
A secure threshold anonymous password-authenticated key exchange protocol
-
Springer-Verlag
-
S.H. Shin, K. Kobara, and H. Imai, "A secure threshold anonymous password-authenticated key exchange protocol," Proc. IWSEC 2007, LNCS 4752, pp.444-458, Springer-Verlag, 2007.
-
Proc. IWSEC 2007, LNCS 4752
, vol.2007
, pp. 444-458
-
-
Shin, S.H.1
Kobara, K.2
Imai, H.3
-
20
-
-
84958985031
-
Efficient 1-out-n oblivious transfer schemes
-
Springer-Verlag
-
W.G. Tzeng, "Efficient 1-out-n oblivious transfer schemes," Proc. PKC 2002, LNCS 2274, pp.159-171, Springer-Verlag, 2002.
-
Proc. PKC 2002, LNCS 2274
, vol.2002
, pp. 159-171
-
-
Tzeng, W.G.1
-
21
-
-
33646844820
-
Anonymous passwordbased authenticated key exchange
-
Springer-Verlag
-
D.Q. Viet, A. Yamamura, and H. Tanaka, "Anonymous passwordbased authenticated key exchange," Proc. INDOCRYPT 2005, LNCS 3797, pp.244-257, Springer-Verlag, 2005.
-
Proc. INDOCRYPT 2005, LNCS 3797
, vol.2005
, pp. 244-257
-
-
Viet, D.Q.1
Yamamura, A.2
Tanaka, H.3
-
22
-
-
77953379774
-
Anonymous passwordbased authenticated key exchange
-
3D3-4, Jan
-
D.Q. Viet, A. Yamamura, and H. Tanaka, "Anonymous passwordbased authenticated key exchange," Proc. 2006 Symposium on Cryptography and Information Security (SCIS 2006), 3D3-4, Jan. 2006.
-
(2006)
Proc. 2006 Symposium on Cryptography and Information Security (SCIS 2006)
-
-
Viet, D.Q.1
Yamamura, A.2
Tanaka, H.3
|