-
1
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
-
Abdalla, M., Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191-208. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
84957714601
-
Robustness principles for public key protocols
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Anderson, R.J., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236-247. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 236-247
-
-
Anderson, R.J.1
Needham, R.2
-
4
-
-
79960267929
-
-
The official UK National Grid Service website
-
The official UK National Grid Service website, http://www.grid-support. ac.uk/
-
-
-
-
5
-
-
19944369828
-
Mechanisms for increasing the usability of grid security
-
Beckles, B., Welch, V., Basney, J.: Mechanisms for increasing the usability of grid security. International Journal of Human-Computer Studies 63(1-2), 74-101 (2005)
-
(2005)
International Journal of Human-Computer Studies
, vol.63
, Issue.1-2
, pp. 74-101
-
-
Beckles, B.1
Welch, V.2
Basney, J.3
-
6
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. Springer, Heidelberg
-
Bao, F., Deng, R.H., Zhu, H.: Variations of Diffie-Hellman problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2836
, pp. 301-312
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
7
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
8
-
-
84947778144
-
The decision Diffie-Hellman problem
-
Buhler, J.P. (ed.) ANTS 1998. Springer, Heidelberg
-
Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
10
-
-
35048866891
-
New security results on Encrypted Key Exchange
-
Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: New security results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145-158. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
11
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1(1), 65-67 (1988)
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-67
-
-
Chaum, D.1
-
12
-
-
24644493543
-
-
Technical report TR 260, Department of Computer Science, ETH Zürich March
-
Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms, Technical report TR 260, Department of Computer Science, ETH Zürich (March 1997)
-
(1997)
Proof Systems for General Statements about Discrete Logarithms
-
-
Camenisch, J.1
Stadler, M.2
-
14
-
-
0027741529
-
Augmented Encrypted Key Exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
November
-
Bellovin, S., Merritt, M.: Augmented Encrypted Key Exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 244-250 (November 1993)
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
15
-
-
78650629525
-
Cryptographic protocol for secure communications
-
U.S. Patent 5,241,599
-
Bellovin, S., Merritt, M.: Cryptographic protocol for secure communications, U.S. Patent 5,241,599, http://patft.uspto.gov/netacgi/nph- Parser?patentnumber=5241599
-
-
-
Bellovin, S.1
Merritt, M.2
-
18
-
-
0032218229
-
A security architecture for computational grids
-
November
-
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 83-92 (November 1998)
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
19
-
-
33749542277
-
A method for making password-based key exchange resilient to server compromise
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Gentry, C., MacKenzie, P., Ramzan, Z.: A method for making password-based key exchange resilient to server compromise. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 142-159. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 142-159
-
-
Gentry, C.1
MacKenzie, P.2
Ramzan, Z.3
-
20
-
-
67650335103
-
A 2-round anonymous veto protocol
-
May
-
Hao, F., Zieliński, P.: A 2-round anonymous veto protocol. In: Proceedings of the 14th International Workshop on Security Protocols, SPW 2006, Cambridge, UK (May 2006)
-
(2006)
Proceedings of the 14th International Workshop on Security Protocols, SPW 2006, Cambridge, UK
-
-
Hao, F.1
Zieliński, P.2
-
22
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communications Review 26(5), 5-26 (1996)
-
(1996)
ACM Computer Communications Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
24
-
-
78650624029
-
Cryptographic methods for remote authentication
-
U.S. Patent 6,226,383
-
Jablon, D.: Cryptographic methods for remote authentication, U.S. Patent 6,226,383, http://patft.uspto.gov/netacgi/nph-Parser?patentnumber=6226383
-
-
-
Jablon, D.1
-
25
-
-
84937539386
-
Password authentication using multiple servers
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Jablon, D.: Password authentication using multiple servers. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 344-360. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 344-360
-
-
Jablon, D.1
-
26
-
-
85084161708
-
Dual-workfactor Encrypted Key Exchange: Efficiently preventing password chaining and dictionary attacks
-
July
-
Jaspan, B.: Dual-workfactor Encrypted Key Exchange: efficiently preventing password chaining and dictionary attacks. In: Proceedings of the Sixth Annual USENIX Security Conference, pp. 43-50 (July 1996)
-
(1996)
Proceedings of the Sixth Annual USENIX Security Conference
, pp. 43-50
-
-
Jaspan, B.1
-
27
-
-
0036825859
-
Pretty-simple password-authenticated key-exchange under standard assumptions
-
Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Transactions E85-A(10), 2229-2237 (2002)
-
(2002)
IEICE Transactions
, vol.E85-A
, Issue.10
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
28
-
-
1842499869
-
On Diffie-Hellman key agreement with short exponents
-
Maurer, U.M. (ed.) EUROCRYPT 1996. Springer, Heidelberg
-
Van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman key agreement with short exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 332-343. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 332-343
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
31
-
-
84937438236
-
Threshold password-authenticated key exchange
-
Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
-
MacKenzie, P.D., Shrimpton, T., Jakobsson, M.: Threshold password-authenticated key exchange. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, p. 385. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 385
-
-
MacKenzie, P.D.1
Shrimpton, T.2
Jakobsson, M.3
-
33
-
-
0013225845
-
On the Security of the SPEKE Password-Authenticated Key Exchange Protocol
-
MacKenzie, P.: On the Security of the SPEKE Password-Authenticated Key Exchange Protocol, Cryptology ePrint Archive: Report 057 (2001)
-
(2001)
Cryptology EPrint Archive: Report 057
-
-
MacKenzie, P.1
-
37
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
38
-
-
0742325040
-
Analysis of the SPEKE password-authenticated key exchange protocol
-
Zhang, M.: Analysis of the SPEKE password-authenticated key exchange protocol. IEEE Communications Letters 8(1), 63-65 (2004)
-
(2004)
IEEE Communications Letters
, vol.8
, Issue.1
, pp. 63-65
-
-
Zhang, M.1
-
39
-
-
32644442153
-
Security analysis of a password-based authentication protocol proposed to IEEE 1363
-
Zhao, Z., Dong, Z., Wang, Y.: Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science 352(1), 280-287 (2006)
-
(2006)
Theoretical Computer Science
, vol.352
, Issue.1
, pp. 280-287
-
-
Zhao, Z.1
Dong, Z.2
Wang, Y.3
|