-
1
-
-
38049071438
-
(Password) Authenticated Key Establishment: From 2-Party to Group
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Abdalla, M., Bohli, J.-M., González Vasco, M.I., Steinwandt, R.: (Password) Authenticated Key Establishment: From 2-Party to Group. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 499-514. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 499-514
-
-
Abdalla, M.1
Bohli, J.-M.2
González Vasco, M.I.3
Steinwandt, R.4
-
2
-
-
33745837743
-
Password-based group key exchange in a constant number of rounds
-
DOI 10.1007/11745853-28, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings
-
Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-Based Group Key Exchange in a Constant Number of Rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 427-442. Springer, Heidelberg (2006) (Pubitemid 44029597)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958 LNCS
, pp. 427-442
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Pointcheval, D.4
-
3
-
-
43149104991
-
Efficient two-party password-based key exchange protocols in the UC framework
-
DOI 10.1007/978-3-540-79263-5-22, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Abdalla, M., Catalano, D., Chevalier, C., Pointcheval, D.: Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 335-351. Springer, Heidelberg (2008) (Pubitemid 351641993)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4964 LNCS
, pp. 335-351
-
-
Abdalla, M.1
Catalano, D.2
Chevalier, C.3
Pointcheval, D.4
-
4
-
-
70350633105
-
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
-
Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
-
Abdalla, M., Catalano, D., Chevalier, C., Pointcheval, D.: Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 254-271. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 254-271
-
-
Abdalla, M.1
Catalano, D.2
Chevalier, C.3
Pointcheval, D.4
-
5
-
-
79951790257
-
Contributory Password-Authenticated Group Key Exchange with Join Capability
-
Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
-
Abdalla, M., Chevalier, C., Granboulan, L., Pointcheval, D.: Contributory Password-Authenticated Group Key Exchange with Join Capability. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 142-160. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6558
, pp. 142-160
-
-
Abdalla, M.1
Chevalier, C.2
Granboulan, L.3
Pointcheval, D.4
-
6
-
-
70350302872
-
Smooth Projective Hashing for Conditionally Extractable Commitments
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth Projective Hashing for Conditionally Extractable Commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671-689. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 671-689
-
-
Abdalla, M.1
Chevalier, C.2
Pointcheval, D.3
-
7
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-Based Authenticated Key Exchange in the Three-Party Setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65-84. Springer, Heidelberg (2005) (Pubitemid 41231326)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
8
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
Abdalla, M., Pointcheval, D.: Simple Password-Based Encrypted Key Exchange Protocols. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 191-208. Springer, Heidelberg (2005) (Pubitemid 41231212)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
9
-
-
77649257689
-
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Abdalla, M., Pointcheval, D.: A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 332-347. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 332-347
-
-
Abdalla, M.1
Pointcheval, D.2
-
10
-
-
33745126318
-
Secure Computation Without Authentication
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Barak, B., Canetti, R., Lindell, Y., Pass, R., Rabin, T.: Secure Computation Without Authentication. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 361-377. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 361-377
-
-
Barak, B.1
Canetti, R.2
Lindell, Y.3
Pass, R.4
Rabin, T.5
-
11
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society Press October
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th Annual Symposium on Foundations of Computer Science, pp. 394-403. IEEE Computer Society Press (October 1997)
-
(1997)
38th Annual Symposium on Foundations of Computer Science
, pp. 394-403
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
12
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
13
-
-
84945119254
-
Entity Authentication and Key Distribution
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
14
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ACM Press May/June
-
Bellare, M., Rogaway, P.: Provably secure session key distribution: The three party case. In: 27th Annual ACM Symposium on Theory of Computing, pp. 57-66. ACM Press (May/June 1995)
-
(1995)
27th Annual ACM Symposium on Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
15
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press May
-
Bellovin, S.M., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Security and Privacy, pp. 72-84. IEEE Computer Society Press (May 1992)
-
(1992)
1992 IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
16
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
17
-
-
84958755223
-
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
-
Zheng, Y. (ed.) ASIACRYPT 2002. Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 497-514. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 497-514
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
18
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM Press October
-
Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM CCS 2003: 10th Conference on Computer and Communications Security, pp. 241-250. ACM Press (October 2003)
-
(2003)
ACM CCS 2003: 10th Conference on Computer and Communications Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
19
-
-
35048866891
-
New Security Results on Encrypted Key Exchange
-
Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. Springer, Heidelberg
-
Bresson, E., Chevassut, O., Pointcheval, D.: New Security Results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 145-158. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
20
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
ACM Press November
-
Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: ACM CCS 2001: 8th Conference on Computer and Communications Security, pp. 255-264. ACM Press (November 2001)
-
(2001)
ACM CCS 2001: 8th Conference on Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
21
-
-
84948991087
-
A Secure and Efficient Conference Key Distribution System
-
(Extended Abstract). De Santis, A. (ed.) EUROCRYPT 1994. Springer, Heidelberg
-
Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System (Extended Abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275-286. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
22
-
-
15344345559
-
A secure and scalable group key exchange system
-
Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Information Processing Letters 94(3), 137-143 (2005)
-
(2005)
Information Processing Letters
, vol.94
, Issue.3
, pp. 137-143
-
-
Burmester, M.1
Desmedt, Y.2
-
23
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Computer Society Press October
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145. IEEE Computer Society Press (October 2001)
-
(2001)
42nd Annual Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
24
-
-
24944566824
-
Universally composable password-based key exchange
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally Composable Password-Based Key Exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404-421. Springer, Heidelberg (2005) (Pubitemid 41313966)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
MacKenzie, P.5
-
25
-
-
35048899333
-
IPAKE: Isomorphisms for Password- Based Authenticated Key Exchange
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Catalano, D., Pointcheval, D., Pornin, T.: IPAKE: Isomorphisms for Password- Based Authenticated Key Exchange. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 477-493. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 477-493
-
-
Catalano, D.1
Pointcheval, D.2
Pornin, T.3
-
26
-
-
84947267092
-
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
27
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. SIGOPS Oper. Syst. Rev. 29, 77-86 (1995)
-
(1995)
SIGOPS Oper. Syst. Rev.
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
28
-
-
40249098609
-
Faster and Shorter Password-Authenticated Key Exchange
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Gennaro, R.: Faster and Shorter Password-Authenticated Key Exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589-606. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 589-606
-
-
Gennaro, R.1
-
29
-
-
35248830706
-
A Framework for Password-based Authenticated Key Exchange
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
Gennaro, R., Lindell, Y.: A Framework for Password-based Authenticated Key Exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer, Heidelberg (2003), http://eprint.iacr.org/2003/032.ps.gz
-
(2003)
LNCS
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
30
-
-
33745793866
-
Password authenticated key exchange using hidden smooth subgroups
-
Atluri, V., Meadows, C., Juels, A. (eds.) ACM Press November
-
Gentry, C., Mackenzie, P.D., Ramzan, Z.: Password authenticated key exchange using hidden smooth subgroups. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM CCS 2005: 12th Conference on Computer and Communications Security, pp. 299-309. ACM Press (November 2005)
-
(2005)
ACM CCS 2005: 12th Conference on Computer and Communications Security
, pp. 299-309
-
-
Gentry, C.1
Mackenzie, P.D.2
Ramzan, Z.3
-
31
-
-
78650032056
-
A new framework for efficient password-based authenticated key exchange
-
Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM Press October
-
Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010: 17th Conference on Computer and Communications Security, pp. 516-525. ACM Press (October 2010)
-
(2010)
ACM CCS 2010: 17th Conference on Computer and Communications Security
, pp. 516-525
-
-
Groce, A.1
Katz, J.2
-
32
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.P.: Strong password-only authenticated key exchange. SIGCOMM Comput. Commun. Rev. 26(5), 5-26 (1996)
-
(1996)
SIGCOMM Comput. Commun. Rev.
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.P.1
-
33
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475-494. Springer, Heidelberg (2001) (Pubitemid 33275849)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
34
-
-
72449123735
-
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 636-652. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 636-652
-
-
Katz, J.1
Vaikuntanathan, V.2
-
35
-
-
79953207657
-
Round-Optimal Password-Based Authenticated Key Exchange
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Round-Optimal Password-Based Authenticated Key Exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293-310. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 293-310
-
-
Katz, J.1
Vaikuntanathan, V.2
-
36
-
-
84957025686
-
Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
-
Christianson, B., Lomas, M. (eds.) Security Protocols 1997. Springer, Heidelberg
-
Lucks, S.: Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 79-90. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1361
, pp. 79-90
-
-
Lucks, S.1
-
37
-
-
84937402236
-
Password-Authenticated Key Exchange Based on RSA
-
Okamoto, T. (ed.) ASIACRYPT 2000. Springer, Heidelberg
-
MacKenzie, P., Patel, S., Swaminathan, R.: Password-Authenticated Key Exchange Based on RSA. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 599-613. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
, pp. 599-613
-
-
MacKenzie, P.1
Patel, S.2
Swaminathan, R.3
-
38
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
ACM Press March
-
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: ACM CCS 1996: 3rd Conference on Computer and Communications Security, pp. 31-37. ACM Press (March 1996)
-
(1996)
ACM CCS 1996: 3rd Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
|