-
1
-
-
43149104991
-
Efficient two-party password-based key exchange protocols in the UC framework
-
Cryptographers' Track - RSA 2008, Springer
-
M. Abdalla, D. Catalano, C. Chevalier, and D. Pointcheval. Efficient two-party password-based key exchange protocols in the UC framework. In Cryptographers' Track - RSA 2008, volume 4964 of LNCS, pages 335-351. Springer, 2008.
-
(2008)
LNCS
, vol.4964
, pp. 335-351
-
-
Abdalla, M.1
Catalano, D.2
Chevalier, C.3
Pointcheval, D.4
-
2
-
-
70350302872
-
Smooth projective hashing for conditionally extractable commitments
-
Advances in Cryptology - Crypto 2009, Springer
-
M. Abdalla, C. Chevalier, and D. Pointcheval. Smooth projective hashing for conditionally extractable commitments. In Advances in Cryptology - Crypto 2009, volume 5677 of LNCS, pages 671-689. Springer, 2009.
-
(2009)
LNCS
, vol.5677
, pp. 671-689
-
-
Abdalla, M.1
Chevalier, C.2
Pointcheval, D.3
-
3
-
-
33745126318
-
Secure computation without authentication
-
Advances in Cryptology - Crypto 2005, Springer
-
B. Barak, R. Canetti, Y. Lindell, R. Pass, and T. Rabin. Secure computation without authentication. In Advances in Cryptology - Crypto 2005, volume 3621 of LNCS, pages 361-377. Springer, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 361-377
-
-
Barak, B.1
Canetti, R.2
Lindell, Y.3
Pass, R.4
Rabin, T.5
-
4
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology - Eurocrypt 2000, Springer
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - Eurocrypt 2000, volume 1807 of LNCS, pages 139-155. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
84945119254
-
Entity authentication and key distribution
-
Advances in Cryptology - Crypto '93, Springer
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto '93, volume 773 of LNCS, pages 232-249. Springer, 1994.
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE
-
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Symposium on Security & Privacy, pages 72-84. IEEE, 1992.
-
(1992)
IEEE Symposium on Security & Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
8
-
-
84937550984
-
Provably secure password-authenticated key exchange using Di±e-Hellman
-
Advances in Cryptology - Eurocrypt 2000, Springer
-
V. Boyko, P. D. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Di±e-Hellman. In Advances in Cryptology - Eurocrypt 2000, volume 1807 of LNCS, pages 156-171. Springer, 2000.
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
10
-
-
24944566824
-
Universally composable password-based key exchange
-
Advances in Cryptology - Eurocrypt 2005, Springer
-
R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. D. MacKenzie. Universally composable password-based key exchange. In Advances in Cryptology - Eurocrypt 2005, volume 3494 of LNCS, pages 404-421. Springer, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.D.5
-
11
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
Advances in Cryptology - Eurocrypt 2002, Springer
-
R. Cramer and V. Shoup. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Advances in Cryptology - Eurocrypt 2002, volume 2332 of LNCS, pages 45-64. Springer, 2002.
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing, 33(1):167-226, 2003.
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
13
-
-
40249098609
-
Faster and shorter password-authenticated key exchange
-
5th Theory of Cryptography Conference - TCC 2008, Springer
-
R. Gennaro. Faster and shorter password-authenticated key exchange. In 5th Theory of Cryptography Conference - TCC 2008, volume 4948 of LNCS, pages 589-606. Springer, 2008.
-
(2008)
LNCS
, vol.4948
, pp. 589-606
-
-
Gennaro, R.1
-
15
-
-
33745184723
-
Session-key generation using human passwords only
-
O. Goldreich and Y. Lindell. Session-key generation using human passwords only. Journal of Cryptology, 19(3):241-340, 2006.
-
(2006)
Journal of Cryptology
, vol.19
, Issue.3
, pp. 241-340
-
-
Goldreich, O.1
Lindell, Y.2
-
16
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE J. Selected Areas in Communications, 11(5):648-656, 1993.
-
(1993)
IEEE J. Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
19
-
-
24144432254
-
Password based key exchange with mutual authentication
-
11th Annual International Workshop on Selected Areas in Cryptography (SAC), Springer
-
S. Jiang and G. Gong. Password based key exchange with mutual authentication. In 11th Annual International Workshop on Selected Areas in Cryptography (SAC), volume 3357 of LNCS, pages 267-279. Springer, 2004.
-
(2004)
LNCS
, vol.3357
, pp. 267-279
-
-
Jiang, S.1
Gong, G.2
-
20
-
-
26444562427
-
Two-server password-only authenticated key exchange
-
3rd Intl. Conference on Applied Cryptography and Network Security, Springer
-
J. Katz, P. D. MacKenzie, G. Taban, and V. D. Gligor. Two-server password-only authenticated key exchange. In 3rd Intl. Conference on Applied Cryptography and Network Security, volume 3531 of LNCS, pages 1-16. Springer, 2005.
-
(2005)
LNCS
, vol.3531
, pp. 1-16
-
-
Katz, J.1
MacKenzie, P.D.2
Taban, G.3
Gligor, V.D.4
-
21
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient and secure authenticated key exchange using weak passwords. J. ACM, 57(1):78-116, 2009.
-
(2009)
J. ACM
, vol.57
, Issue.1
, pp. 78-116
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
22
-
-
72449123735
-
Smooth projective hashing and password-based authenticated key exchange from lattices
-
Advances in Cryptology - Asiacrypt 2009, Springer
-
J. Katz and V. Vaikuntanathan. Smooth projective hashing and password-based authenticated key exchange from lattices. In Advances in Cryptology - Asiacrypt 2009, volume 5912 of LNCS, pages 636-652. Springer, 2009.
-
(2009)
LNCS
, vol.5912
, pp. 636-652
-
-
Katz, J.1
Vaikuntanathan, V.2
-
23
-
-
35048835796
-
A new paradigm of hybrid encryption scheme
-
Advances in Cryptology - Crypto 2004, Springer
-
K. Kurosawa and Y. Desmedt. A new paradigm of hybrid encryption scheme. In Advances in Cryptology - Crypto 2004, volume 3152 of LNCS, pages 426-442. Springer, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 426-442
-
-
Kurosawa, K.1
Desmedt, Y.2
-
24
-
-
84937402236
-
Password-authenticated key exchange based on RSA
-
Advances in Cryptology - Asiacrypt 2000, Springer
-
P. D. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In Advances in Cryptology - Asiacrypt 2000, volume 1976 of LNCS, pages 599-613. Springer, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 599-613
-
-
MacKenzie, P.D.1
Patel, S.2
Swaminathan, R.3
-
25
-
-
38849201191
-
Simpler session-key generation from short random passwords
-
M.-H. Nguyen and S. Vadhan. Simpler session-key generation from short random passwords. Journal of Cryptology, 21(1):52-96, 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.1
, pp. 52-96
-
-
Nguyen, M.-H.1
Vadhan, S.2
-
26
-
-
17144422244
-
A proposal for an ISO standard for public-key encryption
-
V. Shoup. A proposal for an ISO standard for public-key encryption. Cryptology ePrint Archive, Report 2001/112, 2001. http://eprint.iacr.org
-
(2001)
Cryptology EPrint Archive, Report 2001/112
-
-
Shoup, V.1
|