-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
LNCS,Springer
-
Bellare, M.; Pointcheval, D.; Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Proceedings of Advances in Cryptology: EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer (2000).
-
(2000)
Proceedings of Advances in Cryptology: EUROCRYPT 2000
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
2
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
LNCS,Springer
-
Boyko, V.; MacKenzie, P. D.; Patel, S.: Provably secure password-authenticated key exchange using Diffie-Hellman. In: Proceedings of Advances in Cryptology: EUROCRYPT 2000. LNCS, vol. 1807, pp. 156-171. Springer (2000).
-
(2000)
Proceedings of Advances in Cryptology: EUROCRYPT 2000
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.D.2
Patel, S.3
-
3
-
-
35048866891
-
New security results on encrypted key exchange
-
LNCS,Springer
-
Bresson, E.; Chevassut, O.; Pointcheval, D.: New security results on encrypted key exchange. In: Proceedings of PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. LNCS, vol. 2947, pp. 145-158, Springer (2004).
-
(2004)
Proceedings of PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
4
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
LNCS,Springer
-
Gennaro, R.; Lindell, Y.: A framework for password-based authenticated key exchange. In: Proceedings of Advances in Cryptology: EUROCRYPT 2003. LNCS, vol. 2656, pp. 524-543. Springer (2003).
-
(2003)
Proceedings of Advances in Cryptology: EUROCRYPT 2003
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
6
-
-
84958760024
-
Elliptic curve based password authenticated key exchange protocols
-
LNCS,Springer
-
Boyd, C.; Montague, P.; Nguyen, K.: Elliptic curve based password authenticated key exchange protocols. In: Proceedings of 28th Australasian Conference on Information Security and Privacy: ACISP 2001. LNCS, vol. 2119, pp. 487-501, Springer (2001).
-
(2001)
Proceedings of 28th Australasian Conference on Information Security and Privacy: ACISP 2001
, vol.2119
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
7
-
-
84937402236
-
Password-authenticated key exchange based on RSA
-
LNCS,Springer
-
MacKenzie, P. D.; Patel, S.; Swaminathan, R.: Password-authenticated key exchange based on RSA. In: Proceedings of Advances in Cryptology: ASIACRYPT 2000. LNCS, vol. 1976, pp. 599-613. Springer (2000).
-
(2000)
Proceedings of Advances in Cryptology: ASIACRYPT 2000
, vol.1976
, pp. 599-613
-
-
MacKenzie, P.D.1
Patel, S.2
Swaminathan, R.3
-
8
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
(PKC '05). LNCS,Springer
-
Abdalla, M.; Chevassut, O.; Pointcheval, D.: One-time verifier-based encrypted key exchange. In: Proceedings of the 8th International Workshop on Theory and Practice in Public Key (PKC '05). LNCS, vol. 3386, pp. 47-64. Springer (2005).
-
(2005)
Proceedings of the 8th International Workshop on Theory and Practice in Public Key
, vol.3386
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
9
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
LNCS,Springer
-
Abdalla, M.; Pointcheval, D.: Simple password-based encrypted key exchange protocols. In: Proceedings of Topics in Cryptology: CT-RSA 2005. LNCS, vol. 3376, pp. 191-208, Springer (2005).
-
(2005)
Proceedings of Topics in Cryptology: CT-RSA 2005
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
10
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
LNCS,Springer,[Full version appeared in IEE Information Security 153(1), 27-39 (2006)]
-
Abdalla, M.; Fouque, P.-A.; Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Proceedings of PKC'2005. LNCS, vol. 3386, pp. 65-84, Springer (2005) [Full version appeared in IEE Information Security 153(1), 27-39 (2006)].
-
(2005)
Proceedings of PKC'2005
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
11
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
LNCS,Springer
-
Abdalla, M.; Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Proceedings of FC'2005. LNCS, vol. 3570, pp. 341-356. Springer (2005).
-
(2005)
Proceedings of FC'2005
, vol.3570
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
12
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R. X., Cao Z. F (2007) Simple three-party key exchange protocol. Comput. Secur. 26: 94-97.
-
(2007)
Comput. Secur.
, vol.26
, pp. 94-97
-
-
Lu, R.X.1
Cao, Z.F.2
-
13
-
-
69649092978
-
Provably secure password-based three-party key exchange with optimal message steps
-
Chien H. Y., Wu T. C (2009) Provably secure password-based three-party key exchange with optimal message steps. Comput. J. 52(6): 646-655.
-
(2009)
Comput. J.
, vol.52
, Issue.6
, pp. 646-655
-
-
Chien, H.Y.1
Wu, T.C.2
-
14
-
-
68049147074
-
A simple three-party password-based key exchange protocol
-
Huang H.-F (2009) A simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 22(7): 857-862.
-
(2009)
Int. J. Commun. Syst.
, vol.22
, Issue.7
, pp. 857-862
-
-
Huang, H.-F.1
-
15
-
-
84875321481
-
An improvement on a three-party password-based key exchange protocol using weil pairing
-
Zeng Y., Ma J., Moon S (2010) An improvement on a three-party password-based key exchange protocol using weil pairing. Int. J. Netw. Secur. 11(1): 17-22.
-
(2010)
Int. J. Netw. Secur.
, vol.11
, Issue.1
, pp. 17-22
-
-
Zeng, Y.1
Ma, J.2
Moon, S.3
-
16
-
-
80052492581
-
An advanced password authenticated key exchange protocol for imbalanced wireless networks
-
Lo J.-W., Lee J.-Z., Hwang M.-S., Chu Y.-P (2010) An advanced password authenticated key exchange protocol for imbalanced wireless networks. J. Internet Technol. 11(7): 997-1004.
-
(2010)
J. Internet Technol.
, vol.11
, Issue.7
, pp. 997-1004
-
-
Lo, J.-W.1
Lee, J.-Z.2
Hwang, M.-S.3
Chu, Y.-P.4
-
17
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
Lee T-F., Hwang T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf. Sci. 180(9): 1702-1714.
-
(2010)
Inf. Sci.
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.-F.1
Hwang, T.2
-
18
-
-
77958095782
-
A communication- efficient three-party password authenticated key exchange protocol
-
Chang T.-Y., Hwang M.-S., Yang W.-P (2011) A communication- efficient three-party password authenticated key exchange protocol. Inf. Sci. 181: 217-226.
-
(2011)
Inf. Sci.
, vol.181
, pp. 217-226
-
-
Chang, T.-Y.1
Hwang, M.-S.2
Yang, W.-P.3
-
19
-
-
80051506042
-
Secure verifier-based three-party key exchange in the random oracle model
-
H.-Y. Chien (2011) Secure verifier-based three-party key exchange in the random oracle model. J. Inf. Sci. Eng. 27(4): 1487-1501.
-
(2011)
J. Inf. Sci. Eng.
, vol.27
, Issue.4
, pp. 1487-1501
-
-
Chien, H.-Y.1
-
20
-
-
79953330802
-
Efficient three-party password-based key exchange scheme
-
Lou D.-C., Huang H.-F (2011) Efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 24(4): 504-512.
-
(2011)
Int. J. Commun. Syst.
, vol.24
, Issue.4
, pp. 504-512
-
-
Lou, D.-C.1
Huang, H.-F.2
-
21
-
-
84971660027
-
Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
-
LNCS,Springer
-
Wang, W.; Hu, L.: Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. In: Proceedings of INDOCRYPT 2006. LNCS, vol. 4329, pp. 118-132. Springer (2006).
-
(2006)
Proceedings of INDOCRYPT 2006
, vol.4329
, pp. 118-132
-
-
Wang, W.1
Hu, L.2
-
22
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
LNCS,Springer
-
Choo, K.-K. R.; Boyd, C.; Hitchcock, Y.: Examining indistinguishability-based proof models for key establishment protocols. In: Proceedings of ASIACRYPT'2005. LNCS, vol. 3788, pp. 585-604. Springer (2005).
-
(2005)
Proceedings of ASIACRYPT'2005
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
23
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
Chung H.-R., Ku W.-C (2008) Three weaknesses in a simple three-party key exchange protocol. Inf. Sci. 178: 220-229.
-
(2008)
Inf. Sci.
, vol.178
, pp. 220-229
-
-
Chung, H.-R.1
Ku, W.-C.2
-
24
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
Yoon E. J., Yoo K. Y (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int. J. Commun. Syst. 24(4): 532-542.
-
(2011)
Int. J. Commun. Syst.
, vol.24
, Issue.4
, pp. 532-542
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
26
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N (1987) Elliptic curve cryptosystem. Math. Comput. 48: 203-209.
-
(1987)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
29
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y., Horster P (1995) Undetectable on-line password guessing attacks. ACM Oper. Syst. Rev. 29: 77-86.
-
(1995)
ACM Oper. Syst. Rev.
, vol.29
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
30
-
-
84873080000
-
Re-attack on a three-party password-based authenticated key exchange protocol
-
doi: 10. 1016/j. mcm. 2012. 10. 019
-
Liang, H.; Hu, J.; Wu, S.: Re-attack on a three-party password-based authenticated key exchange protocol. Math. Comput. Model. (2012). doi: 10. 1016/j. mcm. 2012. 10. 019.
-
(2012)
Math. Comput. Model
-
-
Liang, H.1
Hu, J.2
Wu, S.3
-
31
-
-
79958169657
-
Security analysis and enhancements of verifier-based password-authenticated key exchange protocols in the three-party setting
-
Wu S (2011) Security analysis and enhancements of verifier-based password-authenticated key exchange protocols in the three-party setting. J. Inf. Sci. Eng. 27: 1059-1072.
-
(2011)
J. Inf. Sci. Eng.
, vol.27
, pp. 1059-1072
-
-
Wu, S.1
|