-
2
-
-
0040231044
-
Foiling the Cracker-A Survey of, and Improvements to, Password Security
-
in
-
D. V. Klein, Foiling the Cracker-A Survey of, and Improvements to, Password Security, in: 2nd USENIXSecurity, pp. 5-14, 1990
-
(1990)
2nd USENIXSecurity
, pp. 5-14
-
-
Klein, D.V.1
-
3
-
-
18744393738
-
Security Proofs for an Efficient Password-Based Key Exchange
-
in
-
E. Bresson, O. Chevassut, and D. Pointcheval, Security Proofs for an Efficient Password-Based Key Exchange, in: ACM. Computer and Commzrnicafion Security, pp. 241-250, 2003.
-
(2003)
ACM. Computer and Commzrnicafion Security
, pp. 241-250
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
4
-
-
0026850091
-
Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks
-
in
-
S. Bellovin, and M. Merritt, Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, in: IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992.
-
(1992)
IEEE Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.1
Merritt, M.2
-
5
-
-
0027741529
-
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise
-
in
-
S. Bellovin and M. Merritt, Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise, in: ACM. Computer and Communication Seczrrity, pp. 244-250, 1993.
-
(1993)
ACM. Computer and Communication Seczrrity
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
6
-
-
84945132563
-
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
-
in, Euvoclypt'Ol, LNCS 2045
-
J. Katz, R. Ostrovsky, and M. Yung, Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords, in: Advances in Cpptolog., Euvoclypt'Ol, LNCS 2045, pp. 475-494,2001
-
(2001)
Advances in Cpptolog
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
10
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
in, Eurocryptl OO
-
M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, in: Advance in cryptology, Eurocryptl OO, pp. 139-155,2000.
-
(2000)
Advance in cryptology
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
11
-
-
0027615231
-
Protecting Poorly Chosen Secrets from Guessing Attacks
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, Protecting Poorly Chosen Secrets from Guessing Attacks, IEEE Journal on Seclected Areas in Communications, 11(5), pp. 648-656,1993.
-
(1993)
IEEE Journal on Seclected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
13
-
-
84937539386
-
Password Authentication Using Multiple Servers
-
in, LNCS 2020
-
D. P. Jablon, Password Authentication Using Multiple Servers, in: RSA Security Conference, LNCS 2020, pp. 344-360,2001.
-
(2001)
RSA Security Conference
, pp. 344-360
-
-
Jablon, D.P.1
-
14
-
-
84937438236
-
Threshold Password-Authenticated Key Exchange
-
in, Cryptor02, LNCS 2442
-
P. Mackenzie, T. Shrimpton, and M. Jakobsson, Threshold Password-Authenticated Key Exchange, in: Advances in Cryptology, Cryptor02, LNCS 2442, pp. 385-400,2002.
-
(2002)
Advances in Cryptology
, pp. 385-400
-
-
McKenzie, P.1
Shrimpton, T.2
Jakobsson, M.3
-
15
-
-
35248822669
-
Provably Secure Threshold Password-Authenticated Key Exchange
-
in, Ezrrocrypt103, LNCS 2656
-
M. D. Raimondo, and R. Gennaro, Provably Secure Threshold Password-Authenticated Key Exchange, in: Advances in Cryptology, Ezrrocrypt103, LNCS 2656, pp. 507-523,2003.
-
(2003)
Advances in Cryptology
, pp. 507-523
-
-
Raimondo, M.D.1
Gennaro, R.2
-
16
-
-
0027726717
-
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
-
in
-
M. Bellare, P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, in: ACM. Computer and Communication Sectrvity, pp. 62-73, 1993.
-
(1993)
ACM. Computer and Communication Sectrvity
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
33646717563
-
A New Two-Server Approach for Authentication with Short Secret
-
in
-
J. Brainard, A. Juels, and B. Kaliski, M. Szydlo, A New Two-Server Approach for Authentication with Short Secret, in: USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Brainard, J.1
Juels, A.2
Kaliski, B.3
Szydlo, M.4
-
18
-
-
0018545449
-
How To Share A Secret
-
A. Shamir, How To Share A Secret, Communications of the ACM, Volume 22, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|