-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Lecture Notes in Comput. Sci. Springer-Verlag
-
M. Bellare, D. Pointcheval, and P. Rogaway Authenticated key exchange secure against dictionary attacks Adv. in Cryptology - Eurocrypt 2000 Lecture Notes in Comput. Sci. vol. 1807 2000 Springer-Verlag 139 155
-
(2000)
Adv. in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
Lecture Notes in Comput. Sci. Springer-Verlag
-
M. Bellare, and P. Rogaway Entity authentication and key distribution Adv. in Cryptology - Crypto 1993 Lecture Notes in Comput. Sci. vol. 773 1994 Springer-Verlag 232 249
-
(1994)
Adv. in Cryptology - Crypto 1993
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
ACM
-
S.M. Bellovin, and M. Merritt Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise 1st ACM Conf. on Computer and Comm. Security 1993 ACM 244 250
-
(1993)
1st ACM Conf. on Computer and Comm. Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
8
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
Lecture Notes in Comput. Sci. Springer-Verlag
-
V. Boyko, P. MacKenzie, and S. Patel Provably secure password- authenticated key exchange using Diffie-Hellman Adv. in Cryptology - Eurocrypt 2000 Lecture Notes in Comput. Sci. vol. 1807 2000 Springer-Verlag 156 171
-
(2000)
Adv. in Cryptology - Eurocrypt 2000
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
9
-
-
33646717563
-
Nightingale: A new two-server approach for authentication with short secrets
-
J. Brainard, A. Juels, B. Kaliski, M. Szydlo, Nightingale: A new two-server approach for authentication with short secrets, in: 12th USENIX Security Symp., 2003, pp. 201-213.
-
(2003)
12th USENIX Security Symp.
, pp. 201-213
-
-
Brainard, J.1
Juels, A.2
Kaliski, B.3
Szydlo, M.4
-
10
-
-
4243180376
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi The random oracle methodology, revisited J. ACM 51 4 2004 557 594
-
(2004)
J. ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
11
-
-
24944566824
-
Universally composable password-based key exchange
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
R. Canetti, S. Halevi, J. Katz, Y. Lindell, and P. MacKenzie Universally-composable password authenticated key exchange Adv. in Cryptology - Eurocrypt 2005 Lecture Notes in Comput. Sci. vol. 3494 2005 Springer-Verlag 404 421 (Pubitemid 41313966)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
13
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Lecture Notes in Comput. Sci. Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers Proofs of partial knowledge and simplified design of witness hiding protocols Adv. in Cryptology - Crypto 1994 Lecture Notes in Comput. Sci. vol. 839 1994 Springer-Verlag 174 187
-
(1994)
Adv. in Cryptology - Crypto 1994
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
14
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
R. Cramer, and V. Shoup Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 1 2003 167 226
-
(2003)
SIAM J. Comput.
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
16
-
-
33746703635
-
Provably secure threshold password-authenticated key exchange
-
DOI 10.1016/j.jcss.2006.02.002, PII S002200000600033X
-
M. Di Raimondo, and R. Gennaro Provably secure threshold password-authenticated key exchange J. Comput. System Sci. 72 6 2006 978 1001 (Pubitemid 44163573)
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.6
, pp. 978-1001
-
-
Di Raimondo, M.1
Gennaro, R.2
-
17
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inform. Theory 31 1985 469 472
-
(1985)
IEEE Trans. Inform. Theory
, vol.31
, pp. 469-472
-
-
El Gamal, T.1
-
20
-
-
33745184723
-
Session-key generation using human passwords only
-
preliminary version in Crypto 2001
-
O. Goldreich, and Y. Lindell Session-key generation using human passwords only J. Cryptology 19 3 2006 241 340 preliminary version in Crypto 2001
-
(2006)
J. Cryptology
, vol.19
, Issue.3
, pp. 241-340
-
-
Goldreich, O.1
Lindell, Y.2
-
21
-
-
0027615231
-
Protecting poorly-chosen secrets from guessing attacks
-
L. Gong, T.M.A. Lomas, R.M. Needham, and J.H. Saltzer Protecting poorly-chosen secrets from guessing attacks IEEE J. Sel. Areas Commun. 11 5 1993 648 656
-
(1993)
IEEE J. Sel. Areas Commun.
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
22
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi, and H. Krawczyk Public-key cryptography and password protocols ACM Trans. Inf. Syst. Secur. 2 3 1999 230 268
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
23
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon Strong password-only authenticated key exchange ACM Comput. Commun. Rev. 26 5 1996 5 20
-
(1996)
ACM Comput. Commun. Rev.
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
24
-
-
84937539386
-
Password Authentication Using Multiple Servers
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
D. Jablon Password authentication using multiple servers RSA Cryptographers Track 2001 Lecture Notes in Comput. Sci. vol. 2020 2001 Springer-Verlag 344 360 (Pubitemid 33255175)
-
(2001)
Lecture Notes in Computer Science
, Issue.2020
, pp. 344-360
-
-
Jablon, D.P.1
-
26
-
-
71449093776
-
Efficient password-authenticated key exchange using human-memorable passwords
-
J. Katz, R. Ostrovsky, and M. Yung Efficient password-authenticated key exchange using human-memorable passwords J. ACM 57 1 2009 78 116
-
(2009)
J. ACM
, vol.57
, Issue.1
, pp. 78-116
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
27
-
-
0024940229
-
Reducing risks from poorly-chosen keys
-
T.M.A. Lomas, L. Gong, J.H. Saltzer, and R.M. Needham Reducing risks from poorly-chosen keys ACM Oper. Syst. Rev. 23 5 1989 14 18
-
(1989)
ACM Oper. Syst. Rev.
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.M.A.1
Gong, L.2
Saltzer, J.H.3
Needham, R.M.4
-
28
-
-
84957025686
-
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
-
Security Protocols
-
S. Lucks Open key exchange: How to defeat dictionary attacks without encrypting public keys Proc. Security Protocols Workshop Lecture Notes in Comput. Sci. vol. 1361 1997 Springer-Verlag 79 90 (Pubitemid 128023881)
-
(1998)
Lecture Notes in Computer Science
, Issue.1361
, pp. 79-90
-
-
Lucks, S.1
-
31
-
-
29644437598
-
Threshold password-authenticated key exchange
-
DOI 10.1007/s00145-005-0232-5
-
P. MacKenzie, T. Shrimpton, and M. Jakobsson Threshold password-authenticated key exchange J. Cryptology 19 1 2006 27 66 (Pubitemid 43023010)
-
(2006)
Journal of Cryptology
, vol.19
, Issue.1
, pp. 27-66
-
-
MacKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
32
-
-
24144440891
-
Proofs for two-server password authentication
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
M. Szydlo, and B. Kaliski Proofs for two-server password authentication RSA Cryptographers Track 2005 Lecture Notes in Comput. Sci. vol. 3376 2005 Springer-Verlag 227 244 (Pubitemid 41231214)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 227-244
-
-
Szydlo, M.1
Kaliski, B.2
|