-
1
-
-
84873466407
-
'Authenticated key exchange secure against dictionary attacks'
-
LNCS 1807
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of Eurocrypt'00, LNCS 1807, pp. 139-155, 2000.
-
(2000)
Proceedings of Eurocrypt'00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
84937550984
-
Provably secure password-authenticated key exchange using Diffie-Hellman
-
LNCS 1807
-
V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proceedings of the Eurocrypt '00, LNCS 1807, pages 156-171, 2000.
-
(2000)
Proceedings of the Eurocrypt '00
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
4
-
-
34948903343
-
Three weaknesses in a simple three-party key exchange protocol
-
H. R. Chung and W. C. Ku. Three weaknesses in a simple three-party key exchange protocol. Information Science, 178(1): 220-229, 2008.
-
(2008)
Information Science
, vol.178
, Issue.1
, pp. 220-229
-
-
Chung, H.R.1
Ku, W.C.2
-
6
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
Y. Ding and P. Horster. Undetectable on-line password guessing attacks. ACM Operating Systems Review, 29(4): 77-86, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
7
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Li, Y. Mu, and X. Zhang. Cryptanalysis of simple three-party key exchange protocol. Computers and Security, 27(1-2): 16-21, 2008.
-
(2008)
Computers and Security
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
9
-
-
24144432254
-
Password based key exchange with mutual authentication
-
LNCS 3357
-
S. Jiang and G. Gong. Password based key exchange with mutual authentication. In Proceedings of SAC '04, LNCS 3357, pages 267-279, 2005.
-
(2005)
Proceedings of SAC '04
, pp. 267-279
-
-
Jiang, S.1
Gong, G.2
-
10
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
LNCS 2045
-
J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proceedings of the Eurocrypt '01, LNCS 2045, pages 475-494, 2001.
-
(2001)
Proceedings of the Eurocrypt '01
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
11
-
-
0008145442
-
Three party-encrypted key exchange: attacks and a solution
-
C. L. Lin, H. M. Sun, and T. Hwang. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review, 34(4): 12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.L.1
Sun, H.M.2
Hwang, T.3
-
13
-
-
33846817471
-
Simple three-party key exchange protocol
-
R. X. Lu and Z. F. Cao. Simple three-party key exchange protocol. Computers and Security, 26(1): 94-97, 2007.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.X.1
Cao, Z.F.2
-
14
-
-
8344221264
-
Enhanced three-party encrypted key exchange without server public keys
-
T. F. Lee, T. Hwang, and C. L. Lin. Enhanced three-party encrypted key exchange without server public keys. Computers and Security, 23(7): 571-577, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 571-577
-
-
Lee, T.F.1
Hwang, T.2
Lin, C.L.3
-
15
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
J. Nam, Y. Lee, S. Kim, and D. Won. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences, 177(6): 1364-1375, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
16
-
-
42649086478
-
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
-
C. W. Phan Raphael, W. C. Yau, and B. M. Goi. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Science, 178(13): 2849-2856, 2008.
-
(2008)
Information Science
, vol.178
, Issue.13
, pp. 2849-2856
-
-
Phan Raphael, C.W.1
Yau, W.C.2
Goi, B.M.3
-
17
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM Operating Systems Review, 29(2): 22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.2
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
18
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
H. A. Wen, T. F. Lee, and T. Hwang. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings-Communications, 152(2): 138-143, 2005.
-
(2005)
IEE Proceedings-Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.A.1
Lee, T.F.2
Hwang, T.3
-
19
-
-
33745922955
-
New approaches to password authenticated key exchange based on RSA
-
LNCS 3329
-
M. Zhang. New approaches to password authenticated key exchange based on RSA. In Proceedings of the Asiacrypt'04, LNCS 3329, pages 230-244, 2004.
-
(2004)
Proceedings of the Asiacrypt'04
, pp. 230-244
-
-
Zhang, M.1
|