-
1
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
in Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography
-
M. Abdalla, P. A. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 3386, 2005, pp. 65-84.
-
(2005)
LNCS
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.A.2
Pointcheval, D.3
-
2
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
in Proceedings of the 9th International Conference on Financial Cryptography and Data Security
-
M. Abdalla and D. Pointcheval, "Interactive Diffie-Hellman assumptions with applications to password-based authentication," in Proceedings of the 9th International Conference on Financial Cryptography and Data Security, LNCS 3570, 2005, pp. 341-356.
-
(2005)
LNCS
, vol.3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
3
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster, "Undetectable on-line password guessing attacks," ACM Operating Systems Review, Vol. 29, 1995, pp. 77-86.
-
(1995)
ACM Operating Systems Review
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
4
-
-
0035701459
-
Three-party Encrypted Key Exchange without server public-keys
-
DOI 10.1109/4234.974498, PII S1089779801110720
-
C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key exchange without server public-keys," IEEE Communication Letters, Vol. 5, 2001, pp. 497-499. (Pubitemid 34099691)
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
5
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C. C. Chang and Y. F. Chang, "A novel three-party encrypted key exchange protocol," Computer Standards and Interfaces, Vol. 26, 2004, pp. 471-476.
-
(2004)
Computer Standards and Interfaces
, vol.26
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
6
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
H. M. Sun, B. C. Chen, and T. Hwang, "Secure key agreement protocols for three-party against guessing attacks," Journal of Systems and Software, Vol. 75, 2005, pp. 63-68.
-
(2005)
Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
7
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
S. W. Lee, H. S. Kim, and K. Y Yoo, "Efficient verifier-based key agreement protocol for three parties without server's public key," Applied Mathematics and Computation, Vol. 167,2005, pp. 996-1003.
-
(2005)
Applied Mathematics and Computation
, vol.167
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
8
-
-
34248672528
-
Efficient verifier-based password-authenticated key exchange in the three-party setting
-
DOI 10.1016/j.csi.2006.12.002, PII S0920548906001395
-
J. O. Kwon, I. R. Jeong, K. Sakurai, and D. H. Lee, "Efficient verifier based password-authenticated key exchange in the three-party setting," Computer Standards and Interfaces, Vol. 29, 2007, pp. 513-520. (Pubitemid 46771127)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 513-520
-
-
Kwon, J.O.1
Jeong, I.R.2
Sakurai, K.3
Lee, D.H.4
-
10
-
-
56549092690
-
Verifier-based password-authenticated key exchange protocol for three-party (In Chinese)
-
W. M. Li, Q. Y. Wen, and H. Zhang, "Verifier-based password-authenticated key exchange protocol for three-party (In Chinese)," TongxinXuebao/Journal on Communication, Vol. 29, 2008, pp. 149-152.
-
(2008)
TongxinXuebao/Journal on Communication,.
, vol.29
, pp. 149-152
-
-
Li, W.M.1
Wen, Q.Y.2
Zhang, H.3
-
11
-
-
12244259085
-
Improvement of Lee and Lee's authenticated key agreement scheme
-
S. W. Lee, H. S. Kim, and K. Y. Yoo, "Improvement of Lee and Lee's authenticated key agreement scheme," Applied Mathematics and Computation, Vol. 162, 2005, pp. 1049-1053.
-
(2005)
Applied Mathematics and Computation,.
, vol.162
, pp. 1049-1053
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
12
-
-
26044435697
-
Cryptanalysis of Lee-KimYoo password-based key agreement schemee
-
J. O. Kwon, J. Y. Hwang, C. W. Kim, and D. H. Lee, "Cryptanalysis of Lee-KimYoo password-based key agreement schemee," Applied Mathmatics and Computation, Vol. 168, 2005, pp. 858-865.
-
(2005)
Applied Mathmatics and Computation, Vol.
, vol.168
, pp. 858-865
-
-
Kwon, J.O.1
Hwang, J.Y.2
Kim, C.W.3
Lee, D.H.4
-
13
-
-
11244267013
-
-
Springer-Verlag, New York
-
D. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag, New York, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
14
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz, "Elliptic curve cryptosystem," Mathematics of Computation, Vol. 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
16
-
-
0003442756
-
-
Cambridge University Press, Cambridge
-
I. F. Blake, G Seroussi, and N. P. Smart, Elliptic Curves in Cryptography, Cambridge University Press, Cambridge, 1999.
-
(1999)
Elliptic Curves in Cryptography
-
-
Blake, I.F.1
Seroussi, G.2
Smart, N.3
-
17
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
in Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
-
P. S. L. M. Barreto, H. Y. Kim, and B. Lynn, "Efficient algorithms for pairing-based cryptosystems," in Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, LNCS 2442, 2002, pp. 354-369.
-
(2002)
LNCS
, vol.2442
, pp. 354-369
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Lynn, B.3
-
19
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
DOI 10.1007/11593447-32, Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
-
K. K. R. Choo, C. Boyd, and Y. Hitchcock, "Examining indistinguishability-based proof models for key establishment protocols," Advances in Cryptology - ASIACRYPT, LNCS 3788, 2005, pp. 585-604. (Pubitemid 43763497)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
20
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
in Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of the 19th International Conference on Theory and Application of Cryptographic Techniques, LNCS 1807, 2000, pp. 139-155.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
21
-
-
35048866891
-
New security results on encrypted key exchange
-
in Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography
-
E. Bresson, O. Chevassut, and D. Pointcheval, "New security results on encrypted key exchange," in Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 2947, 2004, pp. 145-158.
-
(2004)
LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
22
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
in Proceedings of the Cryptographers'" Track at RSA Conference
-
M. Abdalla, M. Bellare, and P. Rogaway, "The oracle Diffie-Hellman assumptions and an analysis of DHIES," in Proceedings of the Cryptographers'" Track at RSA Conference, LNCS 2020, 2001, pp. 143-158.
-
(2001)
LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
23
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
in Proceedings of the Cryptographers' Track at the RSA Conference
-
M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols," in Proceedings of the Cryptographers' Track at the RSA Conference, LNCS 3376, 2005 pp. 191-208.
-
(2005)
LNCS
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
|