-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS 1807
-
M. Bellare, D. Pointcheval, and P. R ogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of Eurocrypt, LNCS 1807, 2000, pp. 139-155.
-
(2000)
Proceedings of Eurocrypt
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Ogaway, P.R.3
-
2
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C. C. Chang and Y. F. Chang, "A novel three-party encrypted key exchange protocol," Computer Standards and Interfaces, Vol. 26, 2004, pp. 471-476.
-
(2004)
Computer Standards and Interfaces
, vol.26
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
3
-
-
46749107236
-
Selectively convertible authenticated encryption in the random oracle model
-
H. Y. Chien, "Selectively convertible authenticated encryption in the random oracle model," The Computer Journal, Vol. 51, 2008, pp. 419-434.
-
(2008)
The Computer Journal
, vol.51
, pp. 419-434
-
-
Chien, H.Y.1
-
4
-
-
36349005859
-
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
-
N. Y. Lee, C. N. Wu, and C. C. Wang, "Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings," Computers and Electrical Engineering, Vol. 34, 2008, pp. 12-20.
-
(2008)
Computers and Electrical Engineering
, vol.34
, pp. 12-20
-
-
Lee, N.Y.1
Wu, C.N.2
Wang, C.C.3
-
5
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
H. R. Chung and W. C. Ku, "Three weaknesses in a simple three-party key exchange protocol," Information Sciences, Vol. 178, 2008, pp. 220-229.
-
(2008)
Information Sciences
, vol.178
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
6
-
-
80051514472
-
Undetectable on-line password guessi ng attacks
-
Y. Ding and P. Horster, "Undetectable on-line password guessi ng attacks," ACM Operating System Review, Vol. 34, 2000, pp. 12-20.
-
(2000)
ACM Operating System Review
, vol.34
, pp. 12-20
-
-
Ding, Y.1
Horster, P.2
-
7
-
-
8344221264
-
E nhanced three-party encrypted key exchange without server public keys
-
T. F. Lee, T. Hwang, and C. L. Lin, "E nhanced three-party encrypted key exchange without server public keys," Computers and Security, Vol. 23, 2004, pp. 571-577.
-
(2004)
Computers and Security
, vol.23
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
8
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
S. W. Lee, H. S. Kim, and K. Y. Yoo, "Efficient verifier-based key agreement protocol for three parties without server's public key," Applied Mathematics and Computation, Vol. 167, 2005, pp. 996-1003.
-
(2005)
Applied Mathematics and Computation
, vol.167
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
9
-
-
0008145442
-
T hree party-encrypted key exchange: Attacks and a solution
-
C. L. Lin, H. M. Sun, and T. Hwang, "T hree party-encrypted key exchange: attacks and a solution," ACM Operating System Review, Vol. 34, 2000, pp. 12-20.
-
(2000)
ACM Operating System Review
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
10
-
-
0035701459
-
Three-party encrypted key ex-change without server public-keys
-
C. L. Lin, H. M. Sun, M. Steiner, and T. Hwang, "Three-party encrypted key ex-change without server public-keys," IEEE Communications Letter, Vol. 5, 2001, pp. 497-479.
-
(2001)
IEEE Communications Letter
, vol.5
, pp. 497-1479
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
11
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. Lu and Z. Cao, "Simple three-party key exchange protocol," Computers and Security, Vol. 26, 2007, pp. 94-97.
-
(2007)
Computers and Security
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
12
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," ACM Operating Systems Review, Vol. 29, 1995, pp. 22-30.
-
(1995)
ACM Operating Systems Review
, vol.29
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
13
-
-
69649092978
-
Provably secure password-based three-party key ex-change with optimal message steps
-
H. Y. Chien and T. C. Wu, "Provably secure password-based three-party key ex-change with optimal message steps," The Computer Journal, Vol. 52, 2009, pp. 646-655.
-
(2009)
The Computer Journal
, vol.52
, pp. 646-655
-
-
Chien, H.Y.1
Wu, T.C.2
-
14
-
-
34248672528
-
Efficient verifier-based password-authenticated key exchange in the three-party setting
-
DOI 10.1016/j.csi.2006.12.002, PII S0920548906001395
-
J. O. Kwon, I. R. Jeong, K. Sakurai, and D. H. Lee, "Efficient verifier-based password-authenticated key exchange in the three-party setting," Computer Standards and Interfaces, Vol. 29, 2007, pp. 513-520. (Pubitemid 46771127)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 513-520
-
-
Kwon, J.O.1
Jeong, I.R.2
Sakurai, K.3
Lee, D.H.4
-
15
-
-
84946844750
-
A one round protocol for tripartite Diffie-Hellm an
-
LNCS 1838
-
A. Joux, "A one round protocol for tripartite Diffie-Hellm an," in Proceedings of Algorithmic Number Theory Symposium, LNCS 1838, 2000, pp. 385-394.
-
(2000)
Proceedings of Algorithmic Number Theory Symposium
, pp. 385-394
-
-
Joux, A.1
-
17
-
-
68949161753
-
An efficient three-party authenti cated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
-
J. H. Yang and C. C. Chang, "An efficient three-party authenti cated key exchange protocol using elliptic curve cryptography for mobile-commerce environments," Journal of Systems and Software, Vol. 82, 2009, pp. 1497-1502.
-
(2009)
Journal of Systems and Software
, vol.82
, pp. 1497-1502
-
-
Yang, J.H.1
Chang, C.C.2
|