-
1
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 139. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
2
-
-
84937550984
-
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
-
Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
-
Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
3
-
-
18744393738
-
Security proofs for an efficient password-based key exchange
-
ACM Press
-
Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In: ACM Conference on Computer Communications Security, pp. 241-250. ACM Press (2003)
-
(2003)
ACM Conference on Computer Communications Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
5
-
-
4043122631
-
A dynamic id-based remote user authentication scheme
-
Das, M.L., Saxena, A., Gulati, V.P.: A dynamic id-based remote user authentication scheme. IEEE Transactions on Consumer Electronics 50, 629-631 (2004)
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
6
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong, L., Lomas, T.M.A., Needham, R.M., Saltzer, J.H.: Protecting poorly chosen secrets from guessing attacks. IEEE J. Selected Areas in Communications 11, 648-656 (1993)
-
(1993)
IEEE J. Selected Areas in Communications
, vol.11
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
7
-
-
54349089114
-
An improved bilinear pairing based remote user authentication scheme
-
Goriparthi, T., Das, M.L., Saxena, A.: An improved bilinear pairing based remote user authentication scheme. Computer Standards and Interfaces 31, 181-185 (2009)
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 181-185
-
-
Goriparthi, T.1
Das, M.L.2
Saxena, A.3
-
10
-
-
62549133356
-
Robust and efficient password-authenticated key agreement using smart cards
-
Juang, W.S., Chen, S.T., Liaw, H.T.: Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans. Industrial Electronics 55, 2551-2556 (2008)
-
(2008)
IEEE Trans. Industrial Electronics
, vol.55
, pp. 2551-2556
-
-
Juang, W.S.1
Chen, S.T.2
Liaw, H.T.3
-
11
-
-
33745179557
-
HMQV: A High-Performance Secure Diffie-Hellman Protocol
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 546-566
-
-
Krawczyk, H.1
-
12
-
-
47249106837
-
Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards
-
Nguyen, N.T., Jo, G.-S.,Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. Springer, Heidelberg
-
Lee, Y.S., Nam, J., Won, D.H.: Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. In: Nguyen, N.T., Jo, G.-S.,Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS (LNAI), vol. 4953, pp. 850-857. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.4953
, pp. 850-857
-
-
Lee, Y.S.1
Nam, J.2
Won, D.H.3
-
13
-
-
54349125537
-
A remote user authentication scheme without using smart cards
-
Rhee, H.S., Kwon, J.O., Lee, D.H.: A remote user authentication scheme without using smart cards. Computer Standards and Interfaces 31, 6-13 (2009)
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 6-13
-
-
Rhee, H.S.1
Kwon, J.O.2
Lee, D.H.3
-
15
-
-
43649083106
-
Cryptanalysis of a password authentication scheme over insecure networks
-
Xiang, T.,Wong, K., Liao, X.: Cryptanalysis of a password authentication scheme over insecure networks. Computer and System Sciences 74, 657-661 (2008)
-
(2008)
Computer and System Sciences
, vol.74
, pp. 657-661
-
-
Xiang, T.1
Wong, K.2
Liao, X.3
-
16
-
-
32644442153
-
Security analysis of a password-based authentication protocol proposed to ieee 1363
-
Zhao, Z., Dong, Z., Wang, Y.: Security analysis of a password-based authentication protocol proposed to ieee 1363. Theoretical Computer Science 352, 280-287 (2006)
-
(2006)
Theoretical Computer Science
, vol.352
, pp. 280-287
-
-
Zhao, Z.1
Dong, Z.2
Wang, Y.3
|