-
1
-
-
0026850091
-
Encrypted key exchange: password-based protocols secure against dictionary attacks
-
S.M. Bellovin, M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, in: Proc. of IEEE Symposium on Security and Privacy, 1992, pp. 72-84.
-
(1992)
Proc. of IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
2
-
-
0036825859
-
Pretty-simple password-authenticated key-exchange under standard assumptions
-
E85-A
-
Kobara K., Imai H. Pretty-simple password-authenticated key-exchange under standard assumptions. IEICE Trans. Fundam. Electron. 2002, E85-A:2229-2237.
-
(2002)
IEICE Trans. Fundam. Electron.
, pp. 2229-2237
-
-
Kobara, K.1
Imai, H.2
-
3
-
-
35048866891
-
New security results on encrypted key exchange
-
Bresson E., Chevassut O., Pointcheval D. New security results on encrypted key exchange, in:Proc. of PKC, in:LNCS 2004, vol. 2947:145-158.
-
(2004)
Proc. of PKC, in:LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
4
-
-
33846461562
-
The PAK suite: protocols for password-authenticated key exchange
-
P1363.2
-
MacKenzie P.D. The PAK suite: protocols for password-authenticated key exchange. Contrib. IEEE 2002, P1363.2.
-
(2002)
Contrib. IEEE
-
-
MacKenzie, P.D.1
-
5
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Proc. of Topics in Cryptology-CT-RSA
-
Abdalla M., Pointcheval D. Simple password-based encrypted key exchange protocols. LNCS 2005, vol. 3376:191-208.
-
(2005)
LNCS
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
6
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
Proc. of PKC
-
Abdalla M., Chevassut O., Pointcheval D. One-time verifier-based encrypted key exchange. LNCS 2005, vol. 3386:47-64.
-
(2005)
LNCS
, vol.3386
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
7
-
-
84958760024
-
Elliptic curve based password authenticated key exchange protocols
-
Proc of ACISP
-
Boyd C., Montague P., Nguyen K. Elliptic curve based password authenticated key exchange protocols. LNCS 2001, vol. 2119:487-501.
-
(2001)
LNCS
, vol.2119
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
8
-
-
0035701459
-
Three-party encrypted key exchange without server's public keys
-
Lin C.-L., Sun H.-M., Steiner M., Hwang T. Three-party encrypted key exchange without server's public keys. IEEE Commun. Lett. 2001, 5:497-499.
-
(2001)
IEEE Commun. Lett.
, vol.5
, pp. 497-499
-
-
Lin, C.-L.1
Sun, H.-M.2
Steiner, M.3
Hwang, T.4
-
9
-
-
25144525619
-
Efficient verifier-based key agreement for three parties without server's public key
-
Lee S.W., Kim H.S., Yoo K.Y. Efficient verifier-based key agreement for three parties without server's public key. Appl. Math. Comput. 2005, 167:996-1003.
-
(2005)
Appl. Math. Comput.
, vol.167
, pp. 996-1003
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
10
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server's public keys
-
Lee T.F., Hwang T., Lin C.L. Enhanced three-party encrypted key exchange without server's public keys. Comput. Secur. 2004, 23:571-577.
-
(2004)
Comput. Secur.
, vol.23
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
11
-
-
0008145442
-
Three-party encrypted key exchange attacks and a solution
-
Lin C.L., Sun H.M., Hwang T. Three-party encrypted key exchange attacks and a solution. AACM Oper. Syst. Rev. 2000, 34:12-20.
-
(2000)
AACM Oper. Syst. Rev.
, vol.34
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
12
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Proc. of PKC
-
Abdalla M., Fouque P.-A., Pointcheval D. Password-based authenticated key exchange in the three-party setting. LNCS 2005, vol. 3386:65-84.
-
(2005)
LNCS
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
13
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
Proc. of FC
-
Abdalla M., Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. LNCS 2005, vol. 3570:341-356.
-
(2005)
LNCS
, vol.3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
14
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R., Cao Z. Simple three-party key exchange protocol. Comput. Secur. 2007, 26:94-97.
-
(2007)
Comput. Secur.
, vol.26
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
15
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
Proc. of ASIACRYPT
-
Choo K.-K.R., Boyd C., Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. LNCS 2005, vol. 3788:585-604.
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
16
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
Guo H., Li Z., Mu Y., Zhang X. Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 2008, 27:16-21.
-
(2008)
Comput. Secur.
, vol.27
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
17
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
Chung H.-R., Ku W.-C. Three weaknesses in a simple three-party key exchange protocol. Inform. Sci. 2008, 178:220-229.
-
(2008)
Inform. Sci.
, vol.178
, pp. 220-229
-
-
Chung, H.-R.1
Ku, W.-C.2
-
18
-
-
68849121226
-
Cryptanalysis of two three-party encrypted key exchange protocols
-
Lo N.W., Yeh Kuo-Hui Cryptanalysis of two three-party encrypted key exchange protocols. Comput. Stand. Interfaces 2009, 31:1167-1174.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, pp. 1167-1174
-
-
Lo, N.W.1
Yeh, K.-H.2
-
19
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
Raphael C.-W.P., Yau W.-C., Bok-Min G. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Inform. Sci. 2008, 178:2849-2856.
-
(2008)
Inform. Sci.
, vol.178
, pp. 2849-2856
-
-
Raphael, C.-W.P.1
Yau, W.-C.2
Bok-Min, G.3
-
20
-
-
58049215501
-
Enhanced password-based simple three-party key exchange protocol
-
Kim H.-S., Choi J.-Y. Enhanced password-based simple three-party key exchange protocol. Comput. Electr. Eng. 2009, 35:107-114.
-
(2009)
Comput. Electr. Eng.
, vol.35
, pp. 107-114
-
-
Kim, H.-S.1
Choi, J.-Y.2
-
21
-
-
84873088253
-
Infringing and improving password security of a three-party key exchange protocol
-
Available at
-
J. Nam, Infringing and improving password security of a three-party key exchange protocol. Available at: http://eprint.iacr.org/2008/065/.
-
-
-
Nam, J.1
-
22
-
-
63649090970
-
An off-line dictionary attack on a simple three-party key exchange protocol
-
Nam J., Paik J., Kang H., Kim U., Won D. An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Commun. Lett. 2009, 13:205-207.
-
(2009)
IEEE Commun. Lett.
, vol.13
, pp. 205-207
-
-
Nam, J.1
Paik, J.2
Kang, H.3
Kim, U.4
Won, D.5
-
23
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
Huang H.-F. A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 2009, 22:857-862.
-
(2009)
Int. J. Commun. Syst.
, vol.22
, pp. 857-862
-
-
Huang, H.-F.1
-
24
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
Yoon E.J., Yoo K.Y. Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 2011, 24:532-542.
-
(2011)
Int. J. Commun. Syst.
, vol.24
, pp. 532-542
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
25
-
-
84862680843
-
Enhancements of a threeparty password-based authenticated key exchange protocol
-
IAJIT First Online Publication
-
Wu S., Chen K., Zhu Y. Enhancements of a threeparty password-based authenticated key exchange protocol. Int. Arab J. Inf. Technol. 2013, 10. IAJIT First Online Publication http://www.ccis2k.org/iajit/PDF/vol.10,no.3/2-2982.pdf.
-
(2013)
Int. Arab J. Inf. Technol.
, vol.10
-
-
Wu, S.1
Chen, K.2
Zhu, Y.3
-
26
-
-
80051506042
-
Secure verifier-based three-party key exchange in the random oracle model
-
Chien H.-Y. Secure verifier-based three-party key exchange in the random oracle model. J. Inf. Sci. Eng. 2011, 27:1487-1501.
-
(2011)
J. Inf. Sci. Eng.
, vol.27
, pp. 1487-1501
-
-
Chien, H.-Y.1
-
27
-
-
84872314754
-
Secure verifier-based three-party password-authenticated key exchange
-
Pu Q., Wang J., Wu S. Secure verifier-based three-party password-authenticated key exchange. Peer Peer Netw. Appl. 2012, 10.1007/s12083-012-0125-y.
-
(2012)
Peer Peer Netw. Appl.
-
-
Pu, Q.1
Wang, J.2
Wu, S.3
-
28
-
-
84971660027
-
Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
-
Proc. of INDOCRYPT
-
Wang W., Hu L. Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. LNCS 2006, vol. 4329:118-132.
-
(2006)
LNCS
, vol.4329
, pp. 118-132
-
-
Wang, W.1
Hu, L.2
-
29
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proc. of EUROCRYPT
-
Bellare M., Pointcheval D., Rogaway P. Authenticated key exchange secure against dictionary attacks. LNCS 2000, vol. 1807:139-155.
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
30
-
-
35048866891
-
New security results on encrypted key exchange
-
Proc. of PKC
-
Bresson E., Chevassut O., Pointcheval D. New security results on encrypted key exchange. LNCS 2004, vol. 2947:145-158.
-
(2004)
LNCS
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
31
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
Proc. of CT-RSA
-
Abdalla M., Bellare M., Rogaway P. The oracle Diffie-Hellman assumptions and an analysis of DHIES. LNCS 2001, vol. 2020:143-158.
-
(2001)
LNCS
, vol.2020
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
|