-
1
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
M. Abdalla and D. Pointcheval, "Simple Password-Based Encrypted Key Exchange Protocols," Proc. Int'l Conf. Topics in Cryptology (CT-RSA), pp. 191-208, 2005. (Pubitemid 41231212)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
2
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
M. Abdalla, O. Chevassut, and D. Pointcheval, "One-Time Verifier-Based Encrypted Key Exchange," Proc. Eighth Int'l Conf. Theory and Practice in Public Key Cryptography (PKC '05), pp. 47-64, 2005. (Pubitemid 41231325)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated Key Exchange Secure against Dictionary Attacks," Proc. 19th Int'l Conf. Theory and Application of Cryptographic Techniques (Eurocrypt '00), pp. 139-155, 2000.
-
(2000)
Proc. 19th Int'l Conf. Theory and Application of Cryptographic Techniques (Eurocrypt '00)
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
5
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. (Crypto '01), pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture notes in computer science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0037623983
-
Identity based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84937550984
-
Provably secure password- authenticated key exchange using diffie-hellman
-
V. Boyko, P. Mackenzie, and S. Patel, "Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman," Proc. 19th Int'l Conf. Theory and Application of Cryptographic Techniques (Eurocrypt '00), pp. 156-171, 2000.
-
(2000)
Proc. 19th Int'l Conf. Theory and Application of Cryptographic Techniques (Eurocrypt '00)
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
9
-
-
33646717563
-
A new two- server approach for authentication with short secret
-
J. Brainard, A. Jueles, B.S. Kaliski, and M. Szydlo, "A New Two- Server Approach for Authentication with Short Secret," Proc. 12th Conf. USENIX Security Symp., pp. 201-214, 2003.
-
(2003)
Proc. 12th Conf. USENIX Security Symp.
, pp. 201-214
-
-
Brainard, J.1
Jueles, A.2
Kaliski, B.S.3
Szydlo, M.4
-
10
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
12
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. IT-31, no. 4, pp. 469-472, July 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
14
-
-
84880888233
-
Session-key generation using human passwords only
-
Advances in Cryptology - CRYPTO 2001
-
O. Goldreich and Y. Lindell, "Session-Key Generation using Human Passwords Only," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), pp. 408-432, 2001. (Pubitemid 33317928)
-
(2001)
Lecture notes in computer science
, Issue.2139
, pp. 408-432
-
-
Goldreich, O.1
Lindell, Y.2
-
15
-
-
0027615231
-
Protecting poorly-chosen secret from guessing attacks
-
June
-
L. Gong, T.M.A. Lomas, R.M. Needham, and J.H. Saltzer, "Protecting Poorly-Chosen Secret from Guessing Attacks," IEEE J. Selected Areas in Comm., vol. 11, no. 5, pp. 648-656, June 1993.
-
(1993)
IEEE J. Selected Areas in Comm.
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
16
-
-
71849087704
-
Public-key cryptography and password protocols
-
S. Halevi and H. Krawczyk, "Public-Key Cryptography and Password Protocols," ACM Trans. Information and System Security, vol. 2, no. 3, pp. 230-268, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
17
-
-
84937539386
-
Password Authentication Using Multiple Servers
-
Topics in Cryptology - CT-RSA 2001 The Cryptographers' Track at RSA Conference 2001 San Francisco, CA, USA, April 8-12, 2001 Proceedings
-
D. Jablon, "Password Authentication Using Multiple Servers," Proc. Conf. Topics in Cryptology: The Cryptographer's Track at RSA (RSA-CT '01), pp. 344-360, 2001. (Pubitemid 33255175)
-
(2001)
Lecture notes in computer science
, Issue.2020
, pp. 344-360
-
-
Jablon, D.P.1
-
18
-
-
38149142394
-
An efficient password-only two- server authenticated key exchange system
-
H. Jin, D.S. Wong, and Y. Xu, "An Efficient Password-Only Two- Server Authenticated Key Exchange System," Proc. Ninth Int'l Conf. Information and Comm. Security (ICICS '07), pp. 44-56, 2007.
-
(2007)
Proc. Ninth Int'l Conf. Information and Comm. Security (ICICS '07)
, pp. 44-56
-
-
Jin, H.1
Wong, D.S.2
Xu, Y.3
-
19
-
-
23044527599
-
Efficient password- authenticated key exchange using human-memorable passwords
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient Password- Authenticated Key Exchange Using Human-Memorable Passwords," Proc. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (Eurocrypt '01), pp. 457-494, 2001.
-
(2001)
Proc. Int'l Conf. Theory and Application of Cryptographic Techniques: Advances in Cryptology (Eurocrypt '01)
, pp. 457-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
20
-
-
26444562427
-
Two-server password-only authenticated key exchange
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
J. Katz, P. MacKenzie, G. Taban, and V. Gligor, "Two-Server Password-Only Authenticated Key Exchange," Proc. Applied Cryptography and Network Security (ACNS '05), pp. 1-16, 2005. (Pubitemid 41422104)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 1-16
-
-
Katz, J.1
MacKenzie, P.2
Taban, G.3
Gligor, V.4
-
22
-
-
0024940229
-
Reducing risks from poorly-chosen keys
-
T.M.A. Lomas, L. Gong, J.H. Saltzer, and R.M. Needham, "Reducing Risks from Poorly-Chosen Keys," ACM Operating Systems Rev., vol. 23, no. 5, pp. 14-18, 1989.
-
(1989)
ACM Operating Systems Rev.
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.M.A.1
Gong, L.2
Saltzer, J.H.3
Needham, R.M.4
-
23
-
-
84937402236
-
Password-authenticated key exchange based on RSA
-
P. MacKenzie, S. Patel, and R. Swaminathan, "Password-Authenticated Key Exchange Based on RSA," Proc. Sixth Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt '00), pp. 599-613, 2000.
-
(2000)
Proc. Sixth Int'l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (Asiacrypt '00)
, pp. 599-613
-
-
Mackenzie, P.1
Patel, S.2
Swaminathan, R.3
-
24
-
-
84937438236
-
Threshold password-authenticated key exchange
-
P. Mackenize, T. Shrimpton, and M. Jakobsson, "Threshold Password-Authenticated key Exchange," Proc. 22nd Ann. Int'l Cryptology Conf. (Crypto '02), pp. 385-400, 2002.
-
(2002)
Proc. 22nd Ann. Int'l Cryptology Conf. (Crypto '02)
, pp. 385-400
-
-
Mackenize, P.1
Shrimpton, T.2
Jakobsson, M.3
-
25
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
84881072446
-
-
http://www.schneier.com/blog/archives/2006/12/realworld-passw.html, 2013.
-
(2013)
-
-
-
27
-
-
24144440891
-
Proofs for two-server password authentication
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
M. Szydlo and B. Kaliski, "Proofs for Two-Server Password Authentication," Proc. Int'l Conf. Topics in Cryptology (RSA-CT '05), pp. 227-244, 2005. (Pubitemid 41231214)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 227-244
-
-
Szydlo, M.1
Kaliski, B.2
-
29
-
-
84885037793
-
A new architecture for authentication and key exchange using password for federated enterprise
-
Y. Yang, F. Bao, and R.H. Deng, "A New Architecture for Authentication and Key Exchange Using Password for Federated Enterprise," Proc. 20th IFIP Int'l Information Security Conf. (SEC '05), pp. 95-111, 2005.
-
(2005)
Proc. 20th IFIP Int'l Information Security Conf. (SEC '05)
, pp. 95-111
-
-
Yang, Y.1
Bao, F.2
Deng, R.H.3
-
30
-
-
33646721791
-
A practical password-based two-server authentication and key exchange system
-
Ar -June
-
Y. Yang, R.H. Deng, and F. Bao, "A Practical Password-Based Two-Server Authentication and key Exchange System," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 2, pp. 105-114, Apr.-June 2006.
-
(2006)
IEEE Trans. Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 105-114
-
-
Yang, Y.1
Deng, R.H.2
Bao, F.3
-
31
-
-
38149082508
-
Fortifying password authentication in integrated healthcare delivery systems
-
Y. Yang, R.H. Deng, and F. Bao, "Fortifying Password Authentication in Integrated Healthcare Delivery Systems," Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '06), pp. 255- 265, 2006.
-
(2006)
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS '06)
, pp. 255-265
-
-
Yang, Y.1
Deng, R.H.2
Bao, F.3
-
32
-
-
77956320773
-
ID-based group password- authenticated key exchange
-
X. Yi, R. Tso, and E. Okamoto, "ID-Based Group Password- Authenticated Key Exchange," Proc. Fourth Int'l Workshop Security: Advances in Information and Computer Security (IWSEC '09), pp. 192- 211, 2009.
-
(2009)
Proc. Fourth Int'l Workshop Security: Advances in Information and Computer Security (IWSEC '09)
, pp. 192-211
-
-
Yi, X.1
Tso, R.2
Okamoto, E.3
-
33
-
-
80052452971
-
Three-party password-authenticated key exchange without random oracles
-
X. Yi, R. Tso, and E. Okamoto, "Three-Party Password-Authenticated Key Exchange without Random Oracles," Proc. Int'l Conf. Security and Cryptography (SECRYPT '11), pp. 15-24, 2011.
-
(2011)
Proc. Int'l Conf. Security and Cryptography (SECRYPT '11)
, pp. 15-24
-
-
Yi, X.1
Tso, R.2
Okamoto, E.3
-
34
-
-
84867646017
-
Identity-based password- authenticated key exchange for client/server model
-
X. Yi, R. Tso, and E. Okamoto, "Identity-Based Password- Authenticated Key Exchange for Client/Server Model," Proc. Int'l Conf. Security and Cryptography (SECRYPT '12), pp. 45-54, 2012.
-
(2012)
Proc. Int'l Conf. Security and Cryptography (SECRYPT '12)
, pp. 45-54
-
-
Yi, X.1
Tso, R.2
Okamoto, E.3
|