-
1
-
-
33845208188
-
Provably secure password-based authentication in TLS
-
ACM Press
-
Abdalla M., Bresson E., Chevassut O., Müller B., and Pointcheval D., "Provably secure password-based authentication in TLS," in Proc. of AsiaCCS'06, pp.35-45, ACM Press, 2006.
-
(2006)
Proc. of AsiaCCS'06
, pp. 35-45
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
M̈ller, B.4
Pointcheval, D.5
-
2
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Full version appeared in IEE Information Security, Vol. 153(1), 2006, pp. 27-39
-
Abdalla M., Fouque P. and Pointcheval D., "Password-based authenticated key exchange in the three-party setting," in Proc. of PKC'2005, LNCS 3386, 2005, pp. 65-84. Full version appeared in IEE Information Security, Vol. 153(1), 2006, pp. 27-39.
-
(2005)
Proc. of PKC'2005, LNCS 3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
4
-
-
26444476977
-
Interactive Diffie-Hellman Assumptions with Applications to Password-based Authentication
-
LNCS 3570
-
Abdalla M. and Pointcheval D., "Interactive Diffie-Hellman Assumptions with Applications to Password-based Authentication," in Proc. Of FC'2005, LNCS 3570, 2005, pp. 341-356.
-
(2005)
Proc. of FC'2005
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
5
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press
-
Bellovin S. and Merritt M., "Encrypted key exchange: Password-based protocols secure against dictionary attacks," in Proc. of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1992, pp. 72-84.
-
(1992)
Proc. of IEEE Symposium On Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
7
-
-
35048866891
-
New security results on encrypted key exchange
-
LNCS 2947
-
Bresson E., Chevassut O., and Pointcheval D., "New security results on encrypted key exchange," in Proc. PKC 2004, LNCS 2947, 2004, pp. 145-158.
-
(2004)
Proc. PKC 2004
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
8
-
-
33646805409
-
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
-
LNCS 3788
-
Choo K., Boyd C. and Hitchcock Y., "Examining Indistinguishability-Based Proof Models for Key Establishment Protocols," in Proc. of ASIACRYPT'2005, LNCS 3788, 2005, pp. 585-604.
-
(2005)
Proc. of ASIACRYPT'2005
, pp. 585-604
-
-
Choo, K.1
Boyd, C.2
Hitchcock, Y.3
-
9
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
Chung H., Ku W., "Three weaknesses in a simple three-party key exchange protocol," Information Science, Vol. 178, 2008, pp. 220-229.
-
(2008)
Information Science
, vol.178
, pp. 220-229
-
-
Chung, H.1
Ku, W.2
-
10
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
Guo H., Li Z., Mu Y. and Zhang X., "Cryptanalysis of simple three-party key exchange protocol," Computers and Security, Vo. 27, 2008, pp. 16-21.
-
(2008)
Computers and Security
, vol.27
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
12
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
Huang H., A simple three-party password-based key exchange protocol. International Journal of Communications and Systems, Vol. 22(7), 2009, pp. 857-862.
-
(2009)
International Journal of Communications and Systems
, vol.22
, Issue.7
, pp. 857-862
-
-
Huang, H.1
-
13
-
-
58049215501
-
Enhanced password-based simple three-party key exchange protocol
-
Kim H. and Choi J., "Enhanced password-based simple three-party key exchange protocol," Computers and Electrical Engineering, Vol. 35, 2009, pp. 107-114.
-
(2009)
Computers and Electrical Engineering
, vol.35
, pp. 107-114
-
-
Kim, H.1
Choi, J.2
-
14
-
-
0036825859
-
Pretty-simple password-authenticated key-exchange under standard assumptions
-
Kobara K. and Imai H., "Pretty-simple password-authenticated key-exchange under standard assumptions," IEICE Transactions, E85-A(10), 2002, pp. 2229-2237. Also available at http://eprint.iacr.org/2003/038/.
-
(2002)
IEICE Transactions
, vol.E85-A
, Issue.10
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
15
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server's public keys
-
Lee T., Hwang T., Lin C., "Enhanced three-party encrypted key exchange without server's public keys," Computers and Security, Vol. 23(7), 2004, pp. 571-577.
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.1
Hwang, T.2
Lin, C.3
-
16
-
-
25144525619
-
Efficient verifier-based key agreement for three parties without server's public key
-
Lee S., Kim H., Yoo K., "Efficient verifier-based key agreement for three parties without server's public key," Applied Mathematics and Computation, Vol. 167(2), 2005, pp. 996-1003.
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.1
Kim, H.2
Yoo, K.3
-
17
-
-
0008145442
-
Three-party encrypted key exchange attacks and a solution
-
Lin C., Sun H. and Hwang T., "Three-party encrypted key exchange attacks and a solution," ACM Operating Systems Review, Vol. 34(4), 2000, pp. 12-20.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
18
-
-
0035701459
-
Three-party encrypted key exchange without server's public keys
-
Lin C., Sun H., Steiner M., and Hwang T., "Three-party encrypted key exchange without server's public keys," IEEE Communications Letters, Vol. 5(12), 2001, pp. 497-499.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.1
Sun, H.2
Steiner, M.3
Hwang, T.4
-
19
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R. and Cao Z., "Simple three-party key exchange protocol," Computers and Security, Vol. 26, 2007, pp. 94-97.
-
(2007)
Computers and Security
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
21
-
-
63649090970
-
An off-line dictionary attack on a simple threeparty key exchange protocol
-
Nam J., Paik J., Kang H., Kim U. and Won D., "An off-line dictionary attack on a simple threeparty key exchange protocol," IEEE Communications Letters, Vol. 13(3), 2009, pp. 205-207.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 205-207
-
-
Nam, J.1
Paik, J.2
Kang, H.3
Kim, U.4
Won, D.5
-
22
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S- 3PAKE)
-
Phan R., Yau W., Goi B., "Cryptanalysis of simple three-party key exchange protocol (S- 3PAKE)," Information Science, Vol. 178, 2008, pp. 2849-2856.
-
(2008)
Information Science
, vol.178
, pp. 2849-2856
-
-
Phan, R.1
Yau, W.2
Goi, B.3
-
23
-
-
84971660027
-
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
-
LNCS 4329
-
Wang W. and Hu L., "Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols," in Proc. of INDOCRYPT 2006, LNCS 4329, 2006, pp. 118-132.
-
(2006)
Proc. of INDOCRYPT 2006
, pp. 118-132
-
-
Wang, W.1
Hu, L.2
-
24
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
Article first published online: 12 JUL 2010
-
Yoon E. and Yoo K., Cryptanalysis of a simple three-party password-based key exchange protocol, International Journal of Communication Systems, Vol. 24(4), pp. 532-542, 2011. (Article first published online: 12 JUL 2010).
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 532-542
-
-
Yoon, E.1
Yoo, K.2
|