-
2
-
-
70350302872
-
Smooth projective hashing for conditionally extractable commitments
-
In: Halevi, S. (ed.), LNCS,, Springer, Heidelberg
-
Abdalla, M., Chevalier, C., Pointcheval, D.: Smooth projective hashing for conditionally extractable commitments. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 671–689. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009
, vol.5677
, pp. 671-689
-
-
Abdalla, M.1
Chevalier, C.2
Pointcheval, D.3
-
3
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
In: Vaudenay, S. (ed.), LNCS, Springer, Heidelberg
-
Abdalla, M., Fouque, P.-A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65–84. Springer, Heidelberg (2005)
-
(2005)
PKC 2005
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
4
-
-
77649257689
-
A scalable password-based group key exchange protocol in the standard model
-
In: Lai, X., Chen, K. (eds.), LNCS, Springer, Heidelberg
-
Abdalla, M., Pointcheval, D.: A scalable password-based group key exchange protocol in the standard model. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 332–347. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 332-347
-
-
Abdalla, M.1
Pointcheval, D.2
-
5
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
In: Krawczyk, H. (ed.), LNCS, Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998)
-
(1998)
CRYPTO 1998
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
In: Preneel, B. (ed.), LNCS, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, p. 139. Springer, Heidelberg (2000)
-
(2000)
EUROCRYPT 2000
, vol.1807
, pp. 139
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
8
-
-
84884471298
-
New techniques for SPHFs and efficient one-round PAKE protocols
-
In: Canetti, R., Garay, J.A. (eds.), LNCS, Springer, Heidelberg
-
Benhamouda, F., Blazy, O., Chevalier, C., Pointcheval, D., Vergnaud, D.: New techniques for SPHFs and efficient one-round PAKE protocols. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 449–475. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part I
, vol.8042
, pp. 449-475
-
-
Benhamouda, F.1
Blazy, O.2
Chevalier, C.3
Pointcheval, D.4
Vergnaud, D.5
-
9
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
In: Krawczyk, H. (ed.), LNCS, Springer, Heidelberg
-
Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1–12. Springer, Heidelberg (1998)
-
(1998)
CRYPTO 1998
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
10
-
-
24944566824
-
Universally composable password-based key exchange
-
In: Cramer, R. (ed.), LNCS, Springer, Heidelberg
-
Canetti, R., Halevi, S., Katz, J., Lindell, Y., MacKenzie, P.: Universally composable password-based key exchange. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 404–421. Springer, Heidelberg (2005)
-
(2005)
EUROCRYPT 2005.
, vol.3494
, pp. 404-421
-
-
Canetti, R.1
Halevi, S.2
Katz, J.3
Lindell, Y.4
Mackenzie, P.5
-
11
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
In: Krawczyk, H. (ed.), LNCS, Springer, Heidelberg
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998)
-
(1998)
CRYPTO 1998.
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
84947267092
-
Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
-
In: Knudsen, L.R. (ed.), LNCS, Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45–64. Springer, Heidelberg (2002)
-
(2002)
EUROCRYPT 2002
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
13
-
-
85028450627
-
Non-malleable cryptography (Extended abstract)
-
ACM Press, May
-
Dolev, D., Dwork, C., Naor, M.: Non-malleable cryptography (extended abstract). In: 23rd ACM STOC, pp. 542–552. ACM Press, May 1991
-
(1991)
23Rd ACM STOC
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
14
-
-
0343337504
-
Nonmalleable cryptography
-
Dolev, D., Dwork, C., Naor, M.: Nonmalleable cryptography. SIAM Journal on Computing 30(2), 391–437 (2000)
-
(2000)
SIAM Journal on Computing
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
15
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
In: Blakely, G.R., Chaum, D. (eds.), LNCS, Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
16
-
-
40249098609
-
Faster and shorter password-authenticated key exchange
-
In: Canetti, R. (ed.), LNCS, Springer, Heidelberg
-
Gennaro, R.: Faster and shorter password-authenticated key exchange. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 589–606. Springer, Heidelberg (2008)
-
(2008)
TCC 2008
, vol.4948
, pp. 589-606
-
-
Gennaro, R.1
-
17
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
In: Biham, E. (ed.), LNCS, Springer, Heidelberg
-
Gennaro, R., Lindell, Y.: A framework for password-based authenticated key exchange. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 524–543. Springer, Heidelberg (2003). http://eprint.iacr.org/2003/032.ps.gz
-
(2003)
EUROCRYPT 2003
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
19
-
-
78650032056
-
A new framework for efficient password-based authenticated key exchange
-
In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.), ACM Press, October
-
Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM CCS 2010, pp. 516–525. ACM Press, October 2010
-
(2010)
ACM CCS 2010
, pp. 516-525
-
-
Groce, A.1
Katz, J.2
-
20
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
Groth, J., Sahai, A.: Efficient non-interactive proof systems for bilinear groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 415–432. Springer, Heidelberg (2008)
-
(2008)
EUROCRYPT 2008
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
21
-
-
24144432254
-
Password based key exchange with mutual authentication
-
In: Handschuh, H., Hasan, M.A. (eds.), LNCS, Springer, Heidelberg
-
Jiang, S., Gong, G.: Password based key exchange with mutual authentication. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 267–279. Springer, Heidelberg (2004)
-
(2004)
SAC 2004
, vol.3357
, pp. 267-279
-
-
Jiang, S.1
Gong, G.2
-
22
-
-
26444562427
-
Two-server password-only authenticated key exchange
-
In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), LNCS, Springer, Heidelberg
-
Katz, J., MacKenzie, P.D., Taban, G., Gligor, V.D.: Two-server password-only authenticated key exchange. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 1–16. Springer, Heidelberg (2005)
-
(2005)
ACNS 2005
, vol.3531
, pp. 1-16
-
-
Katz, J.1
Mackenzie, P.D.2
Taban, G.3
Gligor, V.D.4
-
23
-
-
84945132563
-
Efficient password-authenticated key exchange using human-memorable passwords
-
In: Pfitzmann, B. (ed.), LNCS, Springer, Heidelberg
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 475–494. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001.
, vol.2045
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
24
-
-
35248831117
-
Forward secrecy in password-only key exchange protocols
-
In: Cimato, S., Galdi, C., Persiano, G. (eds.), LNCS, Springer, Heidelberg
-
Katz, J., Ostrovsky, R., Yung, M.: Forward secrecy in password-only key exchange protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 29–44. Springer, Heidelberg (2003)
-
(2003)
SCN 2002
, vol.2576
, pp. 29-44
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
25
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
Katz, J., Ostrovsky, R., Yung, M.: Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM 57(1), 78–116 (2009)
-
(2009)
Journal of the ACM
, vol.57
, Issue.1
, pp. 78-116
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
26
-
-
79953207657
-
Round-optimal password-based authenticated key exchange
-
In: Ishai, Y. (ed.), LNCS, Springer, Heidelberg
-
Katz, J., Vaikuntanathan, V.: Round-optimal password-based authenticated key exchange. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 293–310. Springer, Heidelberg (2011)
-
(2011)
TCC 2011
, vol.6597
, pp. 293-310
-
-
Katz, J.1
Vaikuntanathan, V.2
-
27
-
-
0031332843
-
Number-theoretic constructions of efficient pseudo-random functions
-
IEEE Computer Society Press, October
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, pp. 458–467. IEEE Computer Society Press, October 1997
-
(1997)
38Th FOCS
, pp. 458-467
-
-
Naor, M.1
Reingold, O.2
-
28
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attacks
-
ACM Press, May
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd ACM STOC, pp. 427–437. ACM Press, May 1990
-
(1990)
22Nd ACM STOC
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
29
-
-
84937543435
-
REACT: Rapid enhanced-security asymmetric cryptosystem transform
-
In: Naccache, D. (ed.), LNCS, Springer, Heidelberg
-
Okamoto, T., Pointcheval, D.: REACT: rapid enhanced-security asymmetric cryptosystem transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 159–175. Springer, Heidelberg (2001)
-
(2001)
CT-RSA 2001
, vol.2020
, pp. 159-175
-
-
Okamoto, T.1
Pointcheval, D.2
-
30
-
-
84974554584
-
Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
-
In: Feigenbaum, J. (ed.), LNCS, Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433–444. Springer, Heidelberg (1992)
-
(1992)
CRYPTO 1991
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
|