-
1
-
-
26444476977
-
Interactive diffie-hellman assumptions with applications to password-based authentication
-
Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
-
Abdalla M, Pointcheval D,. Interactive Diffie-Hellman assumptions with applications to password-based authentication. Proceedings of the FC'05 (Lecture Notes in Computer Science, vol. 3570), Roseau, Dominica, 2005; 341-356. (Pubitemid 41425488)
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Abdalla M, Fouque P, Pointcheval D,. Password-based authenticated key exchange in the three-party setting. Proceedings of the PKC'05 (Lecture Notes in Computer Science, vol. 3386), Switzerland, 2005; 65-84. (Pubitemid 41231326)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
3
-
-
0035701459
-
Three-party Encrypted Key Exchange without server public-keys
-
DOI 10.1109/4234.974498, PII S1089779801110720
-
Lin C-L, Sun H-M, Steiner M, Hwang T,. Three-party encrypted key exchange without server public-keys. IEEE Communications Letters 2001; 12 (5): 497-499. (Pubitemid 34099691)
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
4
-
-
84944063128
-
Password-authenticated key exchange between clients with different passwords
-
Singapore
-
Byun J-W, Jeong I-R, Lee D-H, Park C,. Password-authenticated key exchange between clients with different passwords. Proceedings of the ICICS'02 (Lecture Notes in Computer Science, vol. 2513), Singapore, 2002; 134-146.
-
(2002)
Proceedings of the ICICS'02 (Lecture Notes in Computer Science, 2513)
, pp. 134-146
-
-
Byun, J.-W.1
Jeong, I.-R.2
Lee, D.-H.3
Park, C.4
-
5
-
-
79251577196
-
A weakness of the password-authenticated key agreement between clients with different passwords scheme
-
Chen L,. A weakness of the password-authenticated key agreement between clients with different passwords scheme. ISO/IEC JTC 1/SC27 N3716.
-
ISO/IEC JTC 1/SC27 N3716
-
-
Chen, L.1
-
6
-
-
35048872322
-
Weakness of a password-authenticated key exchange protocol between clients with different passwords
-
Yellow Mountain, China
-
Wang S, Wang J, Xu M,. Weakness of a password-authenticated key exchange protocol between clients with different passwords. Proceedings of the ACNS'04 (Lecture Notes in Computer Science, vol. 3089), Yellow Mountain, China, 2004; 414-425.
-
(2004)
Proceedings of the ACNS'04 (Lecture Notes in Computer Science, 3089)
, pp. 414-425
-
-
Wang, S.1
Wang, J.2
Xu, M.3
-
7
-
-
35048854202
-
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
-
Assisi, Italy
-
Kim J, Kim S, Kwak J, Won D,. Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords. Proceedings of the ICCSA 2004 (Lecture Notes in Computer Science, vol. 3043), Assisi, Italy, 2004; 895-902.
-
(2004)
Proceedings of the ICCSA 2004 (Lecture Notes in Computer Science, 3043)
, pp. 895-902
-
-
Kim, J.1
Kim, S.2
Kwak, J.3
Won, D.4
-
8
-
-
26444613363
-
Cryptanalysis of an improved client-to-client Password-Authenticated Key Exchange (C2C-PAKE) scheme
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Phan RC-W, Goi B-M,. Cryptanalysis of an improved client-to-client password authenticated key exchange (C2C-PAKE) scheme. Proceedings of the ACNS'05 (Lecture Notes in Computer Science, vol. 3531), New York, U.S.A., 2005; 33-39. (Pubitemid 41422106)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 33-39
-
-
Phan, R.C.-W.1
Goi, B.-M.2
-
9
-
-
33745649388
-
A secure password-authenticated key exchange between clients with different passwords
-
DOI 10.1007/11610496-88, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings
-
Yoon E-J, Yoo K-Y,. A secure password-authenticated key exchange between clients with different passwords. Proceedings of the APWeb'06 (Lecture Notes in Computer Science, vol. 3842), Harbin, China, 2006; 659-663. (Pubitemid 43973400)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3842
, pp. 659-663
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
10
-
-
34447321042
-
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
-
DOI 10.1016/j.ins.2007.03.024, PII S0020025507001600
-
Byun JW, Lee DH, Lim JI,. EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Information Sciences 2007; 177 (19): 3995-4013. (Pubitemid 47058089)
-
(2007)
Information Sciences
, vol.177
, Issue.19
, pp. 3995-4013
-
-
Byun, J.W.1
Lee, D.H.2
Lim, J.I.3
-
11
-
-
33746374068
-
Secure cross-realm C2C-PAKE protocol
-
Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
Yin Y, Li B,. Secure cross-realm C2C-PAKE protocol. Proceedings of the ACISP'06 (Lecture Notes in Computer Science, vol. 4058), Melbourne, Australia, 2006; 395-406. (Pubitemid 44113026)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058
, pp. 395-406
-
-
Yin, Y.1
Bao, L.2
-
12
-
-
37549042706
-
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
-
Kolkata, India
-
Phan RC-W, Goi B-M,. Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols. Proceedings of the INDOCRYPT'06 (Lecture Notes in Computer Science, vol. 4329), Kolkata, India, 2006; 104-117.
-
(2006)
Proceedings of the INDOCRYPT'06 (Lecture Notes in Computer Science, 4329)
, pp. 104-117
-
-
Phan, R.-W.1
Goi, B.-M.2
-
13
-
-
69849091640
-
A new client-to-client password-authenticated key agreement protocol
-
Zhangjiajie, China
-
Feng D-G, Xu J,. A new client-to-client password-authenticated key agreement protocol. Proceedings of the IWCC'09 (Lecture Notes in Computer Science, vol. 5557), Zhangjiajie, China, 2009; 63-76.
-
(2009)
Proceedings of the IWCC'09 (Lecture Notes in Computer Science, 5557)
, pp. 63-76
-
-
Feng, D.-G.1
Xu, J.2
-
14
-
-
71549145973
-
An efficient and provably secure cross-realm client-to-client password-authenticated key agreement protocol with smart cards
-
Ishikawa, Japan
-
Jin W-T, Xu J,. An efficient and provably secure cross-realm client-to-client password-authenticated key agreement protocol with smart cards. Proceedings of the CANS'09 (Lecture Notes in Computer Science, vol. 5888), Ishikawa, Japan, 2009; 299-314.
-
(2009)
Proceedings of the CANS'09 (Lecture Notes in Computer Science, 5888)
, pp. 299-314
-
-
Jin, W.-T.1
Xu, J.2
-
15
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Bruges, Belgium
-
Bellare M, Pointcheval D, Rogaway P,. Authenticated key exchange secure against dictionary attacks. Proceedings of the EUROCRYPT'00 (Lecture Notes in Computer Science, vol. 1807), Bruges, Belgium, 2000; 139-155.
-
(2000)
Proceedings of the EUROCRYPT'00 (Lecture Notes in Computer Science, 1807)
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
16
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu J, Zhu W-T, Feng D-G,. An improved smart card based password authentication scheme with provable security. Computer Standards and Interfaces 2009; 31 (4): 723-728.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.-T.2
Feng, D.-G.3
|