-
1
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
M. Abdalla, M. Bellare, P. Rogaway, The oracle Diffie-Hellman assumptions and an analysis of DHIES, in: Proceedings of CT-RSA'01, 2001, pp. 143-158.
-
(2001)
Proceedings of CT-RSA'01
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
2
-
-
33845208188
-
Provably secure password-based authentication in TLS
-
M. Abdalla, E. Bresson, O. Chevassut, B. Möller, D. Pointcheval, Provably secure password-based authentication in TLS, in: Proceedings of AsiaCCS'06, 2006, pp. 35-45.
-
(2006)
Proceedings of AsiaCCS'06
, pp. 35-45
-
-
Abdalla, M.1
-
3
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
LNCS 3386
-
M. Abdalla, O. Chevassut, D. Pointcheval, One-time verifier-based encrypted key exchange, in: Proceedings of the 8th International Workshop on Theory and Practice in Public Key (PKC '05), LNCS 3386, 2005, pp. 47-64.
-
(2005)
Proceedings of the 8th International Workshop on Theory and Practice in Public Key (PKC '05)
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
4
-
-
33645734992
-
Password-based authenticated key exchange in the three-party setting
-
M. Abdalla, P.-A. Fouque, D. Pointcheval, Password-based authenticated key exchange in the three-party setting, in: Proceedings of PKC'05, LNCS 3386, 2005, pp. 65-84. (Full version appeared in IEE Information Security 153(1) (2006) 27-39).
-
(2006)
Proceedings of PKC'05, LNCS 3386, 2005, Pp. 65-84. (Full Version Appeared in IEE Information Security
, vol.153
, Issue.1
, pp. 27-39
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
6
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with Applications to Password-based Authentication
-
LNCS 3570
-
M. Abdalla, D. Pointcheval, Interactive Diffie-Hellman assumptions with Applications to Password-based Authentication, in: Proceedings of FC'05, LNCS 3570, 2005, pp. 341-356.
-
(2005)
Proceedings of FC'05
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
8
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS 1807
-
M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, in: Proceedings of Advances in Cryptology - EUROCRYPT'00, LNCS 1807, 2000, pp. 139-155.
-
(2000)
Proceedings of Advances in Cryptology - EUROCRYPT'00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
9
-
-
84958760024
-
Elliptic Curve Based Password Authenticated Key Exchange Protocols
-
LNCS 2119
-
C. Boyd, P. Montague, K. Nguyen, Elliptic Curve Based Password Authenticated Key Exchange Protocols, in: Proceedings of 28th Australasian Conference on Information Security and Privacy - ACISP'01, LNCS 2119, 2001, pp. 487-501.
-
(2001)
Proceedings of 28th Australasian Conference on Information Security and Privacy - ACISP'01
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
10
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
LNCS 1807
-
V. Boyko, P.D. MacKenzie, S. Patel, Provably secure password- authenticated key exchange using Diffie-Hellman, in: Proceedings of Advances in Cryptology - EUROCRYPT'00, LNCS 1807, 2000, pp. 156-171.
-
(2000)
Proceedings of Advances in Cryptology - EUROCRYPT'00
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
11
-
-
35048866891
-
New security results on encrypted key exchange
-
LNCS 2947
-
E. Bresson, O. Chevassut, D. Pointcheval, New security results on encrypted key exchange, in: Proceedings of PKC'04: 7th International Workshop on Theory and Practice in Public Key Cryptography, LNCS 2947, 2004, pp. 145-158.
-
(2004)
Proceedings of PKC'04: 7th International Workshop on Theory and Practice in Public Key Cryptography
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
12
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
C.C. Chang, and Y.F. Chang A novel three-party encrypted key exchange protocol Computer Standards & Interfaces 26 5 2004 471 476
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
13
-
-
77958095782
-
A communication-efficient three-party password authenticated key exchange protocol
-
10.1016/j.ins.2010.08.032
-
T.-Y. Chang, M-S. Hwang, and W-P. Yang A communication-efficient three-party password authenticated key exchange protocol Information Sciences 2010 10.1016/j.ins.2010.08.032
-
(2010)
Information Sciences
-
-
Chang, T.-Y.1
Hwang, M.-S.2
Yang, W.-P.3
-
14
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks
-
H.B. Chen, T.H. Chen, W.B. Lee, and C.C. Chang Security enhancement for a three-party encrypted key exchange protocol against undectectable on-line password guessing attacks Computer Standards & Interfaces 30 1-2 2008 95 99
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.12
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
15
-
-
69649092978
-
Provably secure password-based three-party key exchange with optimal message steps
-
H.Y. Chien, and T.C. Wu Provably secure password-based three-party key exchange with optimal message steps Computer Journal 52 6 2009 646 655
-
(2009)
Computer Journal
, vol.52
, Issue.6
, pp. 646-655
-
-
Chien, H.Y.1
Wu, T.C.2
-
16
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
LNCS 3788
-
K.-K.R. Choo, C. Boyd, Y. Hitchcock, Examining indistinguishability-based proof models for key establishment protocols, in: Proceedings of ASIACRYPT'05, LNCS 3788, 2005, pp. 585-604.
-
(2005)
Proceedings of ASIACRYPT'05
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
17
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
H.R. Chung, and W.C. Ku Three weaknesses in a simple three-party key exchange protocol Information Sciences 178 1 2008 220 229
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
18
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding, and P. Horster Undetectable on-line password guessing attacks ACM Operating Systems Review 29 4 1995 77 86
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
22
-
-
0027615231
-
Protecting poorly choosen secrets from guessing attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer Protecting poorly choosen secrets from guessing attacks IEEE Journal on Selected Areas in Communications 11 5 1993 648 656
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
23
-
-
27244436587
-
Computing Elliptic Curve Cryptography and RSA on bit CPUs
-
N. Gura, A. Patel, A. Wander, H. Eberle, S.C. Shantz, Computing Elliptic Curve Cryptography and RSA on bit CPUs, in: Proceedings of CHES'04, 2004.
-
(2004)
Proceedings of CHES'04
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
26
-
-
58049215501
-
Enhanced password-based simple three-party key exchange protocol
-
H.S. Kim, and J.Y. Choi Enhanced password-based simple three-party key exchange protocol Computers & Electrical Engineering 35 1 2009 107 114
-
(2009)
Computers & Electrical Engineering
, vol.35
, Issue.1
, pp. 107-114
-
-
Kim, H.S.1
Choi, J.Y.2
-
27
-
-
0000112683
-
Elliptic curve cryptosystem
-
N. Koblitz Elliptic curve cryptosystem Mathematics of Computation 48 1987 203 209
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
28
-
-
0033157651
-
An improvement of the password-based authentication protocol K1P on security against replay attacks
-
T. Kwon, M. Kang, S. Jung, and J. Song An improvement of the password-based authentication protocol K1P on security against replay attacks IEICE Transactions on Communications E82-B 7 1999 991 997
-
(1999)
IEICE Transactions on Communications
, vol.82 E -B
, Issue.7
, pp. 991-997
-
-
Kwon, T.1
Kang, M.2
Jung, S.3
Song, J.4
-
29
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
10.1016/j.ins.2010.01.005
-
T.-F. Lee, and T. Hwang Simple password-based three-party authenticated key exchange without server public keys Information Sciences 2010 10.1016/j.ins.2010.01.005
-
(2010)
Information Sciences
-
-
Lee, T.-F.1
Hwang, T.2
-
30
-
-
8344221264
-
A novel three-party encrypted key exchange protocol
-
T.F. Lee, T. Hwang, and C.L. Lin A novel three-party encrypted key exchange protocol Computers & Security 23 2004 571 577
-
(2004)
Computers & Security
, vol.23
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
31
-
-
67649791953
-
Communication-efficient three-party protocols for authentication and key agreement
-
T.F. Lee, J.L. Liu, M.J. Sung, S.B. Yang, and C.M. Chen Communication-efficient three-party protocols for authentication and key agreement Computers & Mathematics with Applications 58 4 2009 641 648
-
(2009)
Computers & Mathematics with Applications
, vol.58
, Issue.4
, pp. 641-648
-
-
Lee, T.F.1
Liu, J.L.2
Sung, M.J.3
Yang, S.B.4
Chen, C.M.5
-
32
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution
-
C.L. Lin, H.M. Sun, and T. Hwang Three-party encrypted key exchange: attacks and a solution ACM Operating Systems Review 34 4 2000 12 20
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
33
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
C.L. Lin, H.M. Sun, M. Steiner, and T. Hwang Three-party encrypted key exchange without server public-keys IEEE Communications Letters 5 12 2001 497 499
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
34
-
-
10444279176
-
Provably secure threeparty password-authenticated key exchange
-
C.L. Lin, H.A. Wen, T. Hwang, and H.M. Sun Provably secure threeparty password-authenticated key exchange IEICE Transaction On Fundamentals E87-A 11 2004 2990 3000
-
(2004)
IEICE Transaction on Fundamentals
, vol.87 E -A
, Issue.11
, pp. 2990-3000
-
-
Lin, C.L.1
Wen, H.A.2
Hwang, T.3
Sun, H.M.4
-
36
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. Lu, and Z. Cao Simple three-party key exchange protocol Computers & Security 26 1 2007 94 97
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
37
-
-
84937402236
-
Password-authenticated key exchange based on RSA
-
P.D. MacKenzie, S. Patel, R. Swaminathan, Password-authenticated key exchange based on RSA, in: Proceedings of Advances in Cryptology - ASIACRYPT'00, LNCS 1976, 2000, pp. 599-613.
-
(2000)
Proceedings of Advances in Cryptology - ASIACRYPT'00, LNCS 1976
, pp. 599-613
-
-
MacKenzie, P.D.1
Patel, S.2
Swaminathan, R.3
-
38
-
-
63649090970
-
An off-line dictionary attack on a simple three-party key exchange protocol
-
J. Nam, J. Paik, H.K. Kang, U.M. Kim, and D. Won An off-line dictionary attack on a simple three-party key exchange protocol IEEE Communications Letters 13 3 2009 205 207
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 205-207
-
-
Nam, J.1
Paik, J.2
Kang, H.K.3
Kim, U.M.4
Won, D.5
-
39
-
-
77958106074
-
A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol
-
J. Nam, J. Paik, and D. Won A security weakness in Abdalla et al.'s generic construction of a group key exchange protocol Information Sciences 181 1 2011 234 238
-
(2011)
Information Sciences
, vol.181
, Issue.1
, pp. 234-238
-
-
Nam, J.1
Paik, J.2
Won, D.3
-
40
-
-
84937389342
-
The gap-problems: A new class of problems for the security of cryptographic schemes
-
T. Okamoto, D. Pointcheval, The gap-problems: a new class of problems for the security of cryptographic schemes, in: Proceedings of PKC'01, 2001, pp. 104-118.
-
(2001)
Proceedings of PKC'01
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
-
43
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
H.M. Sun, B.C. Chen, and T. Hwang Secure key agreement protocols for three-party against guessing attacks Journal of Systems and Software 75 1-2 2005 63 68
-
(2005)
Journal of Systems and Software
, vol.75
, Issue.12
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
44
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using weil pairing
-
H.A. Wen, T.F. Lee, and T. Hwang Provably secure three-party password-based authenticated key exchange protocol using weil pairing IEE Proceedings - Communications 152 2 2005 138 143
-
(2005)
IEE Proceedings - Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
45
-
-
1842478681
-
Password-based user authentication and key distribution protocols for client-server applications
-
H.T. Yeh, and H.M. Sun Password-based user authentication and key distribution protocols for client-server applications Journal of Systems and Software 72 1 2004 97 103
-
(2004)
Journal of Systems and Software
, vol.72
, Issue.1
, pp. 97-103
-
-
Yeh, H.T.1
Sun, H.M.2
-
46
-
-
80055041764
-
Provably secure three-party password-based authenticated key exchange protocol
-
J. Zhao, and Dawu Gu Provably secure three-party password-based authenticated key exchange protocol Information Sciences 184 1 2012 310 323
-
(2012)
Information Sciences
, vol.184
, Issue.1
, pp. 310-323
-
-
Zhao, J.1
Gu, D.2
-
47
-
-
79960186888
-
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
-
10.1016/j.ins.2011.05.009
-
L. Zhang, Q. Wu, B. Qin, and J. Domingo-Ferrer Provably secure one-round identity-based authenticated asymmetric group key agreement protocol Information Sciences 2011 10.1016/j.ins.2011.05.009
-
(2011)
Information Sciences
-
-
Zhang, L.1
Wu, Q.2
Qin, B.3
Domingo-Ferrer, J.4
|