-
1
-
-
0026850091
-
Encrypted key exchange: password-based protocols secure against dictionary attacks
-
IEEE Computer Society Press
-
Bellovin S, Merritt M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proc of IEEE symposium on security and privacyz. IEEE Computer Society Press, pp 72-84.
-
(1992)
Proc of IEEE symposium on security and privacyz
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
2
-
-
0036825859
-
Pretty-simple password-authenticated key-exchange under standard assumptions
-
Kobara K, Imai H (2002) Pretty-simple password-authenticated key-exchange under standard assumptions. Trans IEICE E85-A(10): 2229-2237.
-
(2002)
Trans IEICE
, vol.E85-A
, Issue.10
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
7
-
-
25144525619
-
Efficient verifier-based key agreement for three parties without server's public key
-
Lee S, Kim H, Yoo K (2005) Efficient verifier-based key agreement for three parties without server's public key. Appl Math Comput 167(2): 96-1003.
-
(2005)
Appl Math Comput
, vol.167
, Issue.2
, pp. 96-1003
-
-
Lee, S.1
Kim, H.2
Yoo, K.3
-
8
-
-
0035701459
-
Three-party encrypted key exchange without server's public keys
-
Lin C, Sun H, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server's public keys. IEEE Commun Lett 5(12): 497-499.
-
(2001)
IEEE Commun Lett
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.1
Sun, H.2
Steiner, M.3
Hwang, T.4
-
9
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server's public keys
-
Lee T, Hwang T, Lin C (2004) Enhanced three-party encrypted key exchange without server's public keys. Comput Secur 23(7): 571-577.
-
(2004)
Comput Secur
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.1
Hwang, T.2
Lin, C.3
-
10
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R, Cao Z (2007) Simple three-party key exchange protocol. Comput Secur 26: 94-97.
-
(2007)
Comput Secur
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
11
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
(Full version appeared in IEE Information Security 153(1): 27-39)
-
Abdalla M, Fouque P, Pointcheval D (2006) Password-based authenticated key exchange in the three-party setting. In: Proc of PKC'2005, LNCS 3386, pp 65-84 (Full version appeared in IEE Information Security 153(1): 27-39).
-
(2006)
Proc of PKC'2005, LNCS 3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
12
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
Abdalla M, Pointcheval D (2005) Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Proc of FC'2005, LNCS 3570, pp 341-356.
-
(2005)
Proc of FC'2005, LNCS 3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
13
-
-
34248672528
-
Efficient verifierbased password-authenticated key exchange in the three-party setting
-
Kwon J, Jeong I, Sakurai K, Lee D (2007) Efficient verifierbased password-authenticated key exchange in the three-party setting. Comp Stand Inter 29: 513-520.
-
(2007)
Comp Stand Inter
, vol.29
, pp. 513-520
-
-
Kwon, J.1
Jeong, I.2
Sakurai, K.3
Lee, D.4
-
14
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
Huang H (2009) A simple three-party password-based key exchange protocol. Int J Commun Syst 22(7): 857-862.
-
(2009)
Int J Commun Syst
, vol.22
, Issue.7
, pp. 857-862
-
-
Huang, H.1
-
15
-
-
84862680843
-
Enhancements of a three-party password-based authenticated key exchange protocol
-
IAJIT First Online Publication
-
Wu S, Chen K, Zhu Y (2013) Enhancements of a three-party password-based authenticated key exchange protocol. International Arab Journal of Information Technology, 10(3). IAJIT First Online Publication http://www. ccis2k. org/iajit/PDF/vol. 10, no. 3/2-2982. pdf.
-
(2013)
International Arab Journal of Information Technology
, vol.10
, Issue.3
-
-
Wu, S.1
Chen, K.2
Zhu, Y.3
-
16
-
-
69649092978
-
Provably secure password-based three-party key exchange with optimal message steps
-
Chien H, Wu T (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput J 52(6): 646-655.
-
(2009)
Comput J
, vol.52
, Issue.6
, pp. 646-655
-
-
Chien, H.1
Wu, T.2
-
17
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
Lee T, Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inform Sci 180(9): 1702-1714.
-
(2010)
Inform Sci
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.1
Hwang, T.2
-
18
-
-
80051506042
-
Secure verifier-based three-party key exchange in the random oracle model
-
Chien H (2011) Secure verifier-based three-party key exchange in the random oracle model. J Inf Sci Eng 27(4): 1487-1501.
-
(2011)
J Inf Sci Eng
, vol.27
, Issue.4
, pp. 1487-1501
-
-
Chien, H.1
-
19
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
Yoon E, Yoo K (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4): 532-542.
-
(2011)
Int J Commun Syst
, vol.24
, Issue.4
, pp. 532-542
-
-
Yoon, E.1
Yoo, K.2
-
20
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
Choo K, Boyd C, Hitchcock Y (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Proc of ASIACRYPT'2005, LNCS 3788, pp 585-604.
-
(2005)
Proc of ASIACRYPT'2005, LNCS 3788
, pp. 585-604
-
-
Choo, K.1
Boyd, C.2
Hitchcock, Y.3
-
22
-
-
33845208188
-
Provably secure password-based authentication in TLS
-
Abdalla M, Bresson E, Chevassut O, Möller B, Pointcheval D (2006) Provably secure password-based authentication in TLS. In: Proc of AsiaCCS'06. ACM, pp 35-45.
-
(2006)
Proc of AsiaCCS'06. ACM
, pp. 35-45
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Möller, B.4
Pointcheval, D.5
|