-
1
-
-
84870020538
-
-
Proc. of Advanced in Cryptology-Crypto'98, Santa Barbara, CA
-
Bellare, M., S. Halevi, A. Sahai, and S. Vadhan, Manyto-one trapdoor functions and their relations to publickey cryptosystems, Proc. of Advanced in Cryptology-Crypto'98, Santa Barbara, CA, (1998).
-
(1998)
Manyto-one trapdoor functions and their relations to publickey cryptosystems
-
-
Bellare, M.1
Halevi, S.2
Sahai, A.3
Vadhan, S.4
-
2
-
-
0026850091
-
-
Proc. of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California
-
Bellovin, S.M. and M. Merrit, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proc. of 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, (1992), 72-84.
-
(1992)
Encrypted key exchange: password-based protocols secure against dictionary attacks
, pp. 72-84
-
-
Bellovin, S.M.1
Merrit, M.2
-
3
-
-
48249099653
-
A practical three-party encrypted key exchange protocol with round efficiency, International Journal of Innovative Computing
-
Chang, Y.F., A practical three-party encrypted key exchange protocol with round efficiency, International Journal of Innovative Computing, Information and Control, 4(4), (2008), 953-960.
-
(2008)
Information and Control
, vol.4
, Issue.4
, pp. 953-960
-
-
Chang, Y.F.1
-
4
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang, Y.F. and C.C. Chang, A novel three-party encrypted key exchange protocol, Computer Standards & Interfaces, 26(5), (2004), 471-476.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, Y.F.1
Chang, C.C.2
-
5
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
-
Chen, H.B., T.H. Chen, W.B. Lee, and C.C. Chang, Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks, Computer Standards & Interfaces, 30, (2008), 95-99.
-
(2008)
Computer Standards & Interfaces
, vol.30
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
6
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
Chung, H.R., and W.C. Ku, Three weaknesses in a simple three-party key exchange protocol, Information Sciences, 178(1), (2008), 220-229.
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
7
-
-
0017018484
-
New directions in cryptography
-
Diffie,W., and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, (1976), 644-654.
-
(1976)
IEEE Trans. Inform. Theory IT
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding, Y. and P. Horster, Undetectable on-line password guessing attacks, ACM Operating Systems Review, 29(4), (1995), 77-86.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
9
-
-
0036466678
-
Adding timestamps to the secure electronic auction protocol
-
Hwang, M.S., Eric J.L. Lu, and I.C. Lin, Adding timestamps to the secure electronic auction protocol, Data & Knowledge Engineering, 40(2), (2002), 155-162.
-
(2002)
Data & Knowledge Engineering
, vol.40
, Issue.2
, pp. 155-162
-
-
Hwang, M.S.1
Lu, E.J.L.2
Lin, I.C.3
-
10
-
-
78649433409
-
Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy
-
Lee, C.C., Chang, R.X., and Ko, H.J., Improving two novel three-party encrypted key exchange protocols with perfect forward secrecy, International Journal of Foundations of Computer Science, 21(6), (2010), 979-991.
-
(2010)
International Journal of Foundations of Computer Science
, vol.21
, Issue.6
, pp. 979-991
-
-
Lee, C.C.1
Chang, R.X.2
Ko, H.J.3
-
11
-
-
84855269122
-
On security of a practical threeparty key exchange protocol with round efficiency
-
Lee, C.C., and Y.F. Chang, On security of a practical threeparty key exchange protocol with round efficiency, Information Technology and Control, 37(4), (2008), 333-335.
-
(2008)
Information Technology and Control
, vol.37
, Issue.4
, pp. 333-335
-
-
Lee, C.C.1
Chang, Y.F.2
-
12
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
Lee, T.F., T. Hwang and C.L. Lin, Enhanced three-party encrypted key exchange without server public keys, Computers & Security, 23(7), 2004, 571-577.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
13
-
-
0008145442
-
Three-party encrypted key exchange: attacks and a solution
-
Lin, C.L., H.M. Sun and T. Hwang, Three-party encrypted key exchange: attacks and a solution, ACM Operating Systems Review, 34(4), (2000), 12-20.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
14
-
-
0035701459
-
Three-party encrypted key exchange without server public-keys
-
Lin, C.L., H.M. Sun, M. Steiner and T. Hwang, Three-party encrypted key exchange without server public-keys, IEEE Communications Letters, 5(12), (2001), 497-499.
-
(2001)
IEEE Communications Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.L.1
Sun, H.M.2
Steiner, M.3
Hwang, T.4
-
15
-
-
34548135536
-
Off-line password guessing attack on an efficient key agreement protocol for secure authentication
-
Lu, R. and Z. Cao, Off-line password guessing attack on an efficient key agreement protocol for secure authentication, International Journal of Network Security, 3(1), (2006), 35-38.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.1
, pp. 35-38
-
-
Lu, R.1
Cao, Z.2
-
16
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu, R. and Z. Cao, Simple three-party key exchange protocol, Computers & Security, 26(1), (2007), 94-97.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
18
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
Nam J., Y. Lee, S. Kim, and D. Won, Security weakness in a three-party pairing-based protocol for password authenticated key exchange, Information Sciences, 177(6), (2007), 1364-1375.
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
19
-
-
84870020541
-
-
National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication (FIPS) 197, Available at
-
National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication (FIPS) 197, Available at: http://csrc.nist. gov/publications/fips/fips197/fips-197.pdf.
-
-
-
-
20
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
Shen, J.J., C.W. Lin, and M.S. Hwang, Security enhancement for the timestamp-based password authentication scheme using smart cards, Computers & Security, 22(7), (2003), 591-595.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
21
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
Steiner, M., G. Tsudik and M. Waidner, Refinement and extension of encrypted key exchange, ACM Operating Systems Review, 29(3), (1995), 22-30.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
22
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun, H.M., B.C. Chen, and T. Hwang, Secure key agreement protocols for three-party against guessing attacks, The Journal of Systems and Software, 75, (2005), 63-68.
-
(2005)
The Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
23
-
-
40949152760
-
Password Authentication Schemes: Current Status and Key Issues
-
Tsai, C.S., C.C. Lee, and M. S. Hwang, Password Authentication Schemes: Current Status and Key Issues, International Journal of Network Security, 3(2), (2006), 101-115.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 101-115
-
-
Tsai, C.S.1
Lee, C.C.2
Hwang, M.S.3
-
24
-
-
21644467750
-
Provably secure threeparty password-based authenticated key exchange protocol using Weil pairing
-
Wen, H.A., T.F. Lee, and T. Hwang, Provably secure threeparty password-based authenticated key exchange protocol using Weil pairing, IEE Proceedings-Communications, 152(2), (2005), 138-143.
-
(2005)
IEE Proceedings-Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
|