-
2
-
-
84937550984
-
Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman
-
Berlin: Springer-Verlag
-
V.Boyko, P.MacKenzie, and S.Patel, Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman, in Proceedings of Advances in Cryptology-Eurocrypt 2000, LNCS 1807. Berlin: Springer-Verlag, pp.156-171, 2000.
-
(2000)
Proceedings of Advances In Cryptology-Eurocrypt 2000, LNCS 1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
3
-
-
84945132563
-
Efficient Password Authenticated Key Exchange Using Human-Memorable Passwords
-
Berlin: Springer-Verlag
-
J.Katz, R.Ostrovsky, and M.Yung, Efficient Password Authenticated Key Exchange Using Human-Memorable Passwords, in Proceedings of Advances in Cryptology-Eurocrypt 2001, LNCS 2045. Berlin: Springer-Verlag, pp.475-494, 2001.
-
(2001)
Proceedings of Advances In Cryptology-Eurocrypt 2001, LNCS 2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
4
-
-
0008145442
-
Three-Party Encrypted Key Exchange: Attack and A Solution
-
C. Lin, H. Sung and T. Hwang, Three-Party Encrypted Key Exchange: Attack and A Solution, ACM Operating System Review, vol.34, no. 4, pp.12-20,2000.
-
(2000)
ACM Operating System Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sung, H.2
Hwang, T.3
-
5
-
-
24144444566
-
One-Time Verifier-Based Encrypted Key Exchange
-
Berlin: Springer-Verlag
-
M. Abdalla, O. Chevassut and D. Pointcheval, One-Time Verifier-Based Encrypted Key Exchange, in Proceedings of PKC'05, Switzerland, Berlin: Springer-Verlag, pp. 47-64, 2005.
-
(2005)
Proceedings of PKC'05, Switzerland
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
6
-
-
36248947291
-
Three-Party Password Authenticated Key Exchange With Forward-Security
-
S. H.Wu and Y. F.Zhu, Three-Party Password Authenticated Key Exchange With Forward-Security, Chinese Journal of Computers, vol.30, no.10, pp.1833-1841,2007.
-
(2007)
Chinese Journal of Computers
, vol.30
, Issue.10
, pp. 1833-1841
-
-
Wu, S.H.1
Zhu, Y.F.2
-
7
-
-
77949545770
-
The Three-Party Password Authenticated Key Exchange Protocol With Stronger Security
-
DING Xiao-Fei, MA Chuan-Gui, The Three-Party Password Authenticated Key Exchange Protocol with Stronger Security, vol.33,no. 1:111-118, 2010.
-
(2010)
, vol.33
, Issue.1
, pp. 111-118
-
-
Xiao-Fei, D.I.N.G.1
Chuan-Gui, M.A.2
-
8
-
-
0005078946
-
Entity authentication and key distribution
-
LNCS
-
M. Bellare, P. Rogaway, Entity authentication and key distribution, in Advances in Cryptology-Crypto'93, LNCS, vol. 773, pp.222-249, 1993.
-
(1993)
Advances In Cryptology-Crypto'93
, vol.773
, pp. 222-249
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in Advances in Cryptology-Eurocrypt'00, LNCS, vol. 1807, pp. 139-155, 2000.
-
(2000)
Advances In Cryptology-Eurocrypt'00
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
11
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding, Y. and Horster, P., Undetectable on-line password guessing attacks, ACM Oper. Syst. Rev., vol. 29, pp.77-86, 1995.
-
(1995)
ACM Oper. Syst. Rev
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
12
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Li, Y. Mu, X. Zhang, Cryptanalysis of simple three-party key exchange protocol, Computers & Security, vol. 27, no. 1-2, pp.16-21, 2008.
-
(2008)
Computers & Security
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
13
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
-
H. B. Chen, T. H. Chen, W. B. Lee, C. C. Chang, Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks, Computer Standards & Interfaces, vol. 30, no. 1-2, pp.95-99, 2008.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.1-2
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
14
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun, H.M., Chen, B.C. and Hwang, T., Secure key agreement protocols for three-party against guessing attacks, Journal of Systems and Software, vol.75, no.1-2, pp.63-68, 2005.
-
(2005)
Journal of Systems and Software
, vol.75
, Issue.1-2
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
15
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu, R. and Cao, Z., Simple three-party key exchange protocol, Computers & Security, vol. 26,no.1, pp.94-97,2007.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
16
-
-
78651585097
-
Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps
-
Hung-Yu Chien and Tzong-Chen Wu, Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps, The Computer Journal, pp.1-10,2008.
-
(2008)
The Computer Journal
, pp. 1-10
-
-
Hung-Yu, C.1
Tzong-Chen, W.2
-
17
-
-
47549109760
-
A round-and-computation-efficient three party authentication key exchange protocol
-
Chen, Y.J., Lee, W.B., Chen, H.B., A round-and-computation-efficient three party authentication key exchange protocol, Journal of Systems and Software, vol. 81, no. 9, pp.1581-1590,2008.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.9
, pp. 1581-1590
-
-
Chen, Y.J.1
Lee, W.B.2
Chen, H.B.3
-
18
-
-
68949161753
-
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
Jen-Ho Yang, Chin-Chen Chang, An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments, Journal of Systems and Software, vol.82,no.9, pp.1497-1502, 2009.
-
(2009)
Journal of Systems and Software
, vol.82
, Issue.9
, pp. 1497-1502
-
-
Jen-Ho, Y.1
Chin-Chen, C.2
-
19
-
-
0000537828
-
Efficient identification and signature for smart cards
-
Springer-Verlag
-
Schnorr, C.P., Efficient identification and signature for smart cards, in Proceedings of CRYPTO'89, LNCS, Springer-Verlag, pp.229-252, 1989.
-
(1989)
Proceedings of CRYPTO'89, LNCS
, pp. 229-252
-
-
Schnorr, C.P.1
-
21
-
-
70350135983
-
Comparative study of tripartite identity-based authenticated key agreement protocols
-
M. Hölbl, T. Welzer, B. Brumen, Comparative study of tripartite identity-based authenticated key agreement protocols, Informatica 33, pp.347-355,2009.
-
(2009)
Informatica
, vol.33
, pp. 347-355
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
22
-
-
78651547134
-
An Enhanced Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile Commerce Environments
-
Zuowen Tan, An Enhanced Three-Party Authentication Key Exchange Protocol Using Elliptic Curve Cryptography for Mobile Commerce Environments, Journal of Communications, vol.5, no.6, 2010.
-
(2010)
Journal of Communications, Vol
, vol.5
, pp. 6
-
-
Zuowen, T.1
|