-
1
-
-
0004304523
-
The AuthA protocol for password-based authenticated key exchange
-
M. Bellare and P. Rogaway. The AuthA protocol for password-based authenticated key exchange. Contribution to IEEE P1363, 2000.
-
(2000)
Contribution to IEEE
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM on Computer and Communications Security, pages 244-250, 1993.
-
(1993)
Proceedings of the 1st ACM On Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
4
-
-
84949230533
-
Key agreement protocols and their security analysis
-
S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In Proceedings of the 6th IMA Int.l Conf on Cryptography and Coding, LNCS 1355:30-45, 1997.
-
(1997)
Proceedings of the 6th IMA Int.l Conf On Cryptography and Coding, LNCS
, vol.1355
, pp. 30-45
-
-
Blake-Wilson, S.1
Johnson, D.2
Menezes, A.3
-
5
-
-
84946840551
-
The modular inversion hidden number problem
-
D. Boneh, S. Halevi, and N. Howgrave-Graham. The modular inversion hidden number problem. Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, LNCS 2248:36-51, 2001.
-
(2001)
Proceedings of the 7th International Conference On the Theory and Application of Cryptology and Information Security: Advances In Cryptology, LNCS
, vol.2248
, pp. 36-51
-
-
Boneh, D.1
Halevi, S.2
Howgrave-Graham, N.3
-
6
-
-
84937550984
-
Provably secure password authenticated key exchange using Diffie- Hellmann
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password authenticated key exchange using Diffie- Hellmann. In Proceedings of EUROCRYPT 2000, LNCS 1807:156-171, 2000.
-
(2000)
Proceedings of EUROCRYPT 2000, LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
7
-
-
35048866891
-
New security results on encrypted key exchange
-
E. Bresson, O. Chevassut, and D. Pointcheval. New security results on encrypted key exchange. In Proc. 7th PKC'04, LNCS 2947:145-158, 2004.
-
(2004)
Proc. 7th PKC'04, LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648- 656, 1993.
-
(1993)
IEEE Journal On Selected Areas In Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
9
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon. Strong Password-only Authenticated Key Exchange. SIGCOMM Computer Communication Review, pages 26(5):5-26, 1996.
-
(1996)
SIGCOMM Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
12
-
-
0036825859
-
Pretty-simple passwordauthenticated key-exchange under standard assumptions
-
K. Kobara and H. Imai. Pretty-simple passwordauthenticated key-exchange under standard assumptions. IEICE Transactions, pages 2229-2237, 2002.
-
(2002)
IEICE Transactions
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
20
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. Operating Systems Review, 29(3):22-30, 1995.
-
(1995)
Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|