-
1
-
-
84971660027
-
Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols
-
Springer, Berlin, Germany
-
W. Wang and L. Hu, "Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols, " in Progress in Cryptology-INDOCRYPT 2006, vol. 4329 of Lecture Notes in Computer Science, pp. 118-132, Springer, Berlin, Germany, 2006.
-
(2006)
Progress in Cryptology-INDOCRYPT 2006, 4329 of Lecture Notes in Computer Science
, pp. 118-132
-
-
Wang, W.1
Hu, L.2
-
2
-
-
44849118543
-
Cryptanalysis of simple three-party key exchange protocol
-
H. Guo, Z. Li, Y. Mu, and X. Zhang, "Cryptanalysis of simple three-party key exchange protocol, " Computers and Security, vol. 27, no. 1-2, pp. 16-21, 2008.
-
(2008)
Computers and Security
, vol.27
, Issue.1-2
, pp. 16-21
-
-
Guo, H.1
Li, Z.2
Mu, Y.3
Zhang, X.4
-
3
-
-
63649090970
-
An offline dictionary attack on a simple three-party key exchange protocol
-
J. Nam, J. Paik, H. Kang, U. M. Kim, and D. Won, "An offline dictionary attack on a simple three-party key exchange protocol, " IEEE Communications Letters, vol. 13, no. 3, pp. 205-207, 2009.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.3
, pp. 205-207
-
-
Nam, J.1
Paik, J.2
Kang, H.3
Kim, U.M.4
Won, D.5
-
4
-
-
79953304485
-
Cryptanalysis of a simple three-party password-based key exchange protocol
-
E. Yoon and K. Yoo, "Cryptanalysis of a simple three-party password-based key exchange protocol, " International Journal of Communication Systems, vol. 24, no. 4, pp. 532-542, 2011.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 532-542
-
-
Yoon, E.1
Yoo, K.2
-
5
-
-
84891596035
-
Dictionary attacks against password-based authenticated three-party key exchange protocols
-
J. Nam, K. K. R. Choo, M. Kim, J. Paik, and D. Won, "Dictionary attacks against password-based authenticated three-party key exchange protocols, " KSII Transactions on Internet and Information Systems, vol. 7, no. 12, pp. 3244-3260, 2013.
-
(2013)
KSII Transactions on Internet and Information Systems
, vol.7
, Issue.12
, pp. 3244-3260
-
-
Nam, J.1
Choo, K.K.R.2
Kim, M.3
Paik, J.4
Won, D.5
-
6
-
-
84925253457
-
On the security of a simple three-party key exchange protocol without servers public keys
-
Article ID 479534, 7 pages
-
J. Nam, K. K. R. Choo, M. Park, J. Paik, and D. Won, "On the security of a simple three-party key exchange protocol without servers public keys, " The Scientific World Journal, vol. 2014, Article ID 479534, 7 pages, 2014.
-
(2014)
The Scientific World Journal
, vol.2014
-
-
Nam, J.1
Choo, K.K.R.2
Park, M.3
Paik, J.4
Won, D.5
-
7
-
-
84945119254
-
Entity authentication and key distribution
-
Springer, Berlin, Germany
-
M. Bellare and P. Rogaway, "Entity authentication and key distribution, " in Proceedings of the Advances in Cryptology (CRYPTO 93), vol. 773 of Lecture Notes in Computer Science, pp. 232-249, Springer, Berlin, Germany.
-
Proceedings of the Advances in Cryptology (CRYPTO 93), 773 of Lecture Notes in Computer Science
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Springer, Berlin, Germany
-
M. Abdalla, P. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting, " in Public Key Cryptography, vol. 3386 of Lecture Notes in Computer Science, pp. 65-84, Springer, Berlin, Germany, 2005.
-
(2005)
Public Key Cryptography 3386 of Lecture Notes in Computer Science
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
9
-
-
33645734992
-
Password-based authenticated key exchange in the three-party setting
-
M. Abdalla, P. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting, " IEE Proceedings-Information Security, vol. 153, no. 1, pp. 27-39, 2006.
-
(2006)
IEE Proceedings-Information Security
, vol.153
, Issue.1
, pp. 27-39
-
-
Abdalla, M.1
Fouque, P.2
Pointcheval, D.3
-
10
-
-
26444476977
-
Interactive diffie-hellman assumptions with applications to password-based authentication
-
Springer, Berlin, Germany, March
-
M. Abdalla and D. Pointcheval, "Interactive diffie-hellman assumptions with applications to password-based authentication, " in Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC 05), pp. 341-356, Springer, Berlin, Germany, March 2005.
-
(2005)
Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC 05)
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
11
-
-
21644467750
-
Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
-
H. Wen, T. Lee, and T. Hwang, "Provably secure three-party password-based authenticated key exchange protocol using Weil pairing, " IEE Proceedings-Communications, vol. 152, no. 2, pp. 138-143, 2005.
-
(2005)
IEE Proceedings-Communications
, vol.152
, Issue.2
, pp. 138-143
-
-
Wen, H.1
Lee, T.2
Hwang, T.3
-
12
-
-
78650717256
-
Password authenticated key exchange based on RSA in the three-party settings
-
Provable Security, Springer, Berlin, Germany
-
E. Dongna, Q. Cheng, and C. Ma, "Password authenticated key exchange based on RSA in the three-party settings, " in Provable Security, vol. 5848of LectureNotes in Computer Science, pp. 168-182, Springer, Berlin, Germany, 2009.
-
(2009)
LectureNotes in Computer Science
, vol.5848
, pp. 168-182
-
-
Dongna, E.1
Cheng, Q.2
Ma, C.3
-
13
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
T. Lee and T. Hwang, "Simple password-based three-party authenticated key exchange without server public keys, " Information Sciences, vol. 180, no. 9, pp. 1702-1714, 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.1
Hwang, T.2
-
14
-
-
79960769127
-
How to construct secure and efficient three-party password-based authenticated key exchange protocols
-
Springer, Berlin, Germany
-
W. Wang, L. Hu, and Y. Li, "How to construct secure and efficient three-party password-based authenticated key exchange protocols, " in Information Security and Cryptology, vol. 6584 of LectureNotes in Computer Science, pp. 218-235, Springer, Berlin, Germany, 2011.
-
(2011)
Information Security and Cryptology, 6584 of LectureNotes in Computer Science
, pp. 218-235
-
-
Wang, W.1
Hu, L.2
Li, Y.3
-
15
-
-
81255208426
-
On a simple three-partypassword-based key exchange protocol"
-
C. LinandT. Hwang, "On"a simple three-partypassword-based key exchange protocol", " International Journal of Communication Systems, vol. 24, no. 11, pp. 1520-1532, 2011.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.11
, pp. 1520-1532
-
-
LinandT. Hwang, C.1
-
16
-
-
84864760957
-
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
-
S. Wu, Q. Pu, S. Wang, and D. He, "Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol, " Information Sciences, vol. 215, pp. 83-96, 2012.
-
(2012)
Information Sciences
, vol.215
, pp. 83-96
-
-
Wu, S.1
Pu, Q.2
Wang, S.3
He, D.4
-
17
-
-
84900022765
-
Password-only authenticated three-party key exchange with provable security in the standard model
-
Article ID 825072, 11 pages, 2014
-
J. Nam, K. K. R. Choo, J. Kim, H. Kang, J. Paik, and D. Won, "Password-only authenticated three-party key exchange with provable security in the standard model, " The Scientific World Journal, vol. 2014, Article ID 825072, 11 pages, 2014.
-
(2014)
The Scientific World Journal
-
-
Nam, J.1
Choo, K.K.R.2
Kim, J.3
Kang, H.4
Paik, J.5
Won, D.6
-
18
-
-
33845941453
-
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
-
J. Nam, Y. Lee, S. Kim, and D. Won, "Security weakness in a three-party pairing-based protocol for password authenticated key exchange, " Information Sciences, vol. 177, no. 6, pp. 1364-1375, 2007.
-
(2007)
Information Sciences
, vol.177
, Issue.6
, pp. 1364-1375
-
-
Nam, J.1
Lee, Y.2
Kim, S.3
Won, D.4
-
19
-
-
58549103172
-
Efficient and strongly secure passwordbased server aided key exchange
-
Springer, Berlin, Germany
-
K. Yoneyama, "Efficient and strongly secure passwordbased server aided key exchange, " in Progress in Cryptology (INDOCRYPT 08), vol. 5365 of Lecture Notes in Computer Science, pp. 172-184, Springer, Berlin, Germany, 2008.
-
(2008)
Progress in Cryptology (INDOCRYPT 08) 5365 of Lecture Notes in Computer Science
, pp. 172-184
-
-
Yoneyama, K.1
-
20
-
-
80055041764
-
Provably secure three-party passwordbased authenticated key exchange protocol
-
J. Zhao and D. Gu, "Provably secure three-party passwordbased authenticated key exchange protocol, " Information Sciences, vol. 184, no. 1, pp. 310-323, 2012.
-
(2012)
Information Sciences
, vol.184
, Issue.1
, pp. 310-323
-
-
Zhao, J.1
Gu, D.2
-
21
-
-
0008145442
-
Three-party encrypted key exchange: Attacks and a solution, "
-
ACM
-
C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution, " ACM SIGOPS Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000.
-
(2000)
SIGOPS Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
22
-
-
69649092978
-
Provably secure password-based threeparty key exchange with optimal message steps
-
H. Chien and T. Wu, "Provably secure password-based threeparty key exchange with optimal message steps, " The Computer Journal, vol. 52, no. 6, pp. 646-655, 2009.
-
(2009)
The Computer Journal
, vol.52
, Issue.6
, pp. 646-655
-
-
Chien, H.1
Wu, T.2
-
23
-
-
68849121226
-
Cryptanalysis of two three-party encrypted key exchange protocols
-
N. W. Lo and K. Yeh, "Cryptanalysis of two three-party encrypted key exchange protocols, " Computer Standards and Interfaces, vol. 31, no. 6, pp. 1167-1174, 2009.
-
(2009)
Computer Standards and Interfaces
, vol.31
, Issue.6
, pp. 1167-1174
-
-
Lo, N.W.1
Yeh, K.2
-
24
-
-
79953330802
-
Efficient three-party password-based key exchange scheme
-
D. Lou and H. Huang, "Efficient three-party password-based key exchange scheme, " International Journal of Communication Systems, vol. 24, no. 4, pp. 504-512, 2011.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 504-512
-
-
Lou, D.1
Huang, H.2
-
25
-
-
84355166674
-
Provably secure three-party password authenticated key exchange protocol in the standard model
-
J. Yang and T. Cao, "Provably secure three-party password authenticated key exchange protocol in the standard model, " Journal of Systems and Software, vol. 85, no. 2, pp. 340-350, 2012.
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.2
, pp. 340-350
-
-
Yang, J.1
Cao, T.2
-
26
-
-
84876132598
-
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
-
S. Wu, K. Chen, Q. Pu, and Y. Zhu, "Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme, " International Journal of Communication Systems, vol. 26, no. 5, pp. 674-686, 2013.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.5
, pp. 674-686
-
-
Wu, S.1
Chen, K.2
Pu, Q.3
Zhu, Y.4
-
27
-
-
84876863193
-
Provably secure three party encrypted key exchange scheme with explicit authentication
-
H. Tsai and C. Chang, "Provably secure three party encrypted key exchange scheme with explicit authentication, " Information Sciences, vol. 238, pp. 242-249, 2013.
-
(2013)
Information Sciences
, vol.238
, pp. 242-249
-
-
Tsai, H.1
Chang, C.2
-
28
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer, Berlin, Germany
-
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks, " in Advances in Cryptology-EUROCRYPT 2000, vol. 1807 of Lecture Notes in Computer Science, pp. 139-155, Springer, Berlin, Germany, 2000.
-
(2000)
Advances in Cryptology-EUROCRYPT 2000, 1807 of Lecture Notes in Computer Science
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
29
-
-
84945132563
-
Efficient passwordauthenticated key exchange using human-memorable passwords
-
Springer, Berlin, Germany
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient passwordauthenticated key exchange using human-memorable passwords, " in Advances in Cryptology-EUROCRYPT 2001, vol. 2045 of Lecture Notes in Computer Science, pp. 475-494, Springer, Berlin, Germany, 2001.
-
(2001)
Advances in Cryptology-EUROCRYPT, 2001 2045 of Lecture Notes in Computer Science
, pp. 475-494
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
30
-
-
71449093776
-
Efficient and secure authenticated key exchange using weak passwords
-
article 3, 39 pages
-
J. Katz, R. Ostrovsky, and M. Yung, "Efficient and secure authenticated key exchange using weak passwords, " Journal of the ACM, vol. 57, no. 1, article 3, 39 pages, 2010.
-
(2010)
Journal of the ACM
, vol.57
, Issue.1
-
-
Katz, J.1
Ostrovsky, R.2
Yung, M.3
-
31
-
-
35248830706
-
A framework for passwordbased authenticated key exchange
-
Springer, Berlin, Germany
-
R. Gennaro and Y. Lindell, "A framework for passwordbased authenticated key exchange, " in Advances in Cryptology-EUROCRYPT 2003, vol. 2656 of Lecture Notes in Computer Science, pp. 524-543, Springer, Berlin, Germany, 2003.
-
(2003)
Advances in Cryptology-EUROCRYPT 2003, 2656 of Lecture Notes in Computer Science
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
32
-
-
33645605444
-
The PAK suite: Protocols for passwordauthenticated key exchange
-
P. MacKenzie, "The PAK suite: protocols for passwordauthenticated key exchange, " Contributions to IEEE P1363. 2, 2002.
-
(2002)
Contributions to IEEE P1363.2
-
-
MacKenzie, P.1
-
33
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Oakland, Calif, USA May
-
S. M. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks, " in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 72-84, Oakland, Calif, USA, May 1992.
-
(1992)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
34
-
-
35048866891
-
New security results on encrypted key exchange
-
Public Key Cryptography, Springer, Berlin, Germany
-
E. Bresson, O. Chevassut, and D. Pointcheval, "New security results on encrypted key exchange, " in Public Key Cryptography, vol. 2947 of Lecture Notes in Computer Science, pp. 145-158, Springer, Berlin, Germany, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2947
, pp. 145-158
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
-
36
-
-
35048891868
-
Keying hash functions for message authentication
-
Springer, Berlin, Germany
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication, " in Advances in Cryptology-CRYPTO '96, vol. 1109 of Lecture Notes in Computer Science, pp. 1-15, Springer, Berlin, Germany, 1996.
-
(1996)
Advances in Cryptology-CRYPTO '96 1109 of Lecture Notes in Computer Science
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
37
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
The Cryptographers Track at the RSA Conference, Springer, Berlin, Germany
-
M. Abdalla and D. Pointcheval, "Simple password-based encrypted key exchange protocols, " in The Cryptographers Track at the RSA Conference, vol. 3376 of Lecture Notes in Computer Science, pp. 191-208, Springer, Berlin, Germany, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
38
-
-
34548765558
-
A proof of revised Yahalom protocol in the Bellare and Rogaway (1993) model
-
K. K. R. Choo, "A proof of revised Yahalom protocol in the Bellare and Rogaway (1993) model, " Computer Journal, vol. 50, no. 5, pp. 591-601, 2007.
-
(2007)
Computer Journal
, vol.50
, Issue.5
, pp. 591-601
-
-
Choo, K.K.R.1
|