-
1
-
-
0026850091
-
-
Encrypted key exchange: password-based protocols secure against dictionary attacks. Proc. IEEE Symp. on Research in Security and Privacy
-
Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. Proc. IEEE Symp. on Research in Security and Privacy 1992; 72-84.
-
(1992)
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
2
-
-
0029531472
-
-
Optimal authentication protocols resistant to password guessing attacks. Proceedings of the 8th IEEE Computer Security Foundation Workshop : -.
-
Gong L. Optimal authentication protocols resistant to password guessing attacks. Proceedings of the 8th IEEE Computer Security Foundation Workshop 1995: 24-29.
-
(1995)
, pp. 24-29
-
-
Gong, L.1
-
3
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
Gong L, Lomas M, Needham R, Saltzer J. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications 1993; 11(5):648-656.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
5
-
-
0008145442
-
Three-party encrypted key exchange: attacks and a solution
-
Lin CL, Sun HM, Hwang T. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 2000; 34(4):12-20.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
6
-
-
9544230689
-
Secure key agreement protocols for three-party against guessing attacks
-
Sun HM, Chen BC, Hwang T. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 2005; 75:63-68.
-
(2005)
Journal of Systems and Software
, vol.75
, pp. 63-68
-
-
Sun, H.M.1
Chen, B.C.2
Hwang, T.3
-
7
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
Lee TF, Hwang T. Simple password-based three-party authenticated key exchange without server public keys. Information Sciences 2010; 180(9):1702-1714.
-
(2010)
Information Sciences
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.F.1
Hwang, T.2
-
8
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Ding Y, Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29(4):77-86.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
9
-
-
32244432466
-
Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords
-
E89-A
-
Nam J, Kim S, Won D. Attack on the Sun-Chen-Hwang's three-party key agreement protocols using passwords. IEICE Transactions on Fundamentals 2006; E89-A(1):209-212.
-
(2006)
IEICE Transactions on Fundamentals
, Issue.1
, pp. 209-212
-
-
Nam, J.1
Kim, S.2
Won, D.3
-
10
-
-
2342566530
-
A novel three-party encrypted key exchange protocol
-
Chang CC, Chang YF. A novel three-party encrypted key exchange protocol. Computer Standards & Interfaces 2004; 26(5):471-476.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.C.1
Chang, Y.F.2
-
11
-
-
84957657742
-
-
Many-to-one trapdoor functions and their relations to public-key cryptosystems. Proceedings of the CRYPTO'98, of LNCS 1462
-
Bellare M, Halevi S, Sahai A, Vadhan S. Many-to-one trapdoor functions and their relations to public-key cryptosystems. Proceedings of the CRYPTO'98, of LNCS 1462, 1998; 283-298.
-
(1998)
, pp. 283-298
-
-
Bellare, M.1
Halevi, S.2
Sahai, A.3
Vadhan, S.4
-
12
-
-
0024868772
-
-
A hard-core predicate for all one-way functions. Proceedings of the 21st ACM Symposium on the Theory of Computing ; -.
-
Goldreich O, Levin L. A hard-core predicate for all one-way functions. Proceedings of the 21st ACM Symposium on the Theory of Computing 1989; 25-32.
-
(1989)
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
13
-
-
0024866742
-
-
Limits on the provable consequences of one-way permutations. Proceedings of the 21st ACM Symposium on the Theory of Computing ; -.
-
Impagaliazzo R, Rudich S. Limits on the provable consequences of one-way permutations. Proceedings of the 21st ACM Symposium on the Theory of Computing 1989; 44-61.
-
(1989)
, pp. 44-61
-
-
Impagaliazzo, R.1
Rudich, S.2
-
14
-
-
35448940560
-
Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks
-
Chen HB, Chen TH, Lee WB, Chang CC. Security enhancement for a three-party encrypted key exchange protocol against undetectable online password guessing attacks. Computer Standards & Interfaces 2008; 30:95-99.
-
(2008)
Computer Standards & Interfaces
, vol.30
, pp. 95-99
-
-
Chen, H.B.1
Chen, T.H.2
Lee, W.B.3
Chang, C.C.4
-
15
-
-
42949161502
-
Improving the novel three-party encrypted key exchange protocol
-
Yoon EJ, Yoo KY. Improving the novel three-party encrypted key exchange protocol. Computer Standards & Interfaces 2008; 30:309-314.
-
(2008)
Computer Standards & Interfaces
, vol.30
, pp. 309-314
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
16
-
-
68849121226
-
Cryptanalysis of two three-party encrypted key exchange protocols
-
Lo NW, Yeh KH. Cryptanalysis of two three-party encrypted key exchange protocols. Computer Standards & Interfaces 2009; 31:1167-1174.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 1167-1174
-
-
Lo, N.W.1
Yeh, K.H.2
-
18
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R, Cao Z. Simple three-party key exchange protocol. Computers & Security 2007; 26(1):94-97.
-
(2007)
Computers & Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.1
Cao, Z.2
-
19
-
-
47549109760
-
A round and computation-efficient three-party authenticated key exchange protocol
-
Chen TH, Lee WB, Chen HB. A round and computation-efficient three-party authenticated key exchange protocol. Journal of Systems and Software 2008; 81(9):1581-1590.
-
(2008)
Journal of Systems and Software
, vol.81
, Issue.9
, pp. 1581-1590
-
-
Chen, T.H.1
Lee, W.B.2
Chen, H.B.3
-
20
-
-
77958095782
-
A communication-efficient three-party password authenticated key exchange protocol
-
Chang TY, Hwang MS, Yang WP. A communication-efficient three-party password authenticated key exchange protocol. Information Sciences 2011; 181(1):217-226.
-
(2011)
Information Sciences
, vol.181
, Issue.1
, pp. 217-226
-
-
Chang, T.Y.1
Hwang, M.S.2
Yang, W.P.3
-
21
-
-
80055041764
-
Provably secure three-party password-based authenticated key exchange protocol
-
Zhao J, Gu D. Provably secure three-party password-based authenticated key exchange protocol. Information Sciences 2012; 184(1):310-323.
-
(2012)
Information Sciences
, vol.184
, Issue.1
, pp. 310-323
-
-
Zhao, J.1
Gu, D.2
|