-
1
-
-
33746365751
-
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
-
D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. of Cryptology, 4(2):75-122, 1991.
-
(1991)
J. Of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
2
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In STOC’98, pages 419-428.
-
STOC’98
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, pages 139-155.
-
(2000)
In EUROCRYPT
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO’93, pages 232-249.
-
CRYPTO’93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security (CCS’93), pages 62-73.
-
In ACM Security (CCS’93)
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
0001940580
-
Provably secure session key distribution|the three party case
-
M. Bellare and P. Rogaway. Provably secure session key distribution|the three party case. In STOC’95, pages 57-66.
-
STOC’95
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of IEEE Security and Privacy, pages 72-84, 1992.
-
(1992)
Proceedings of IEEE Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
9
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Security (CCS’93), pages 244-250.
-
ACM Security (CCS’93)
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
12
-
-
0033280383
-
Public-key cryptography and password protocols: The multi-user case
-
M. Boyarsky. Public-key cryptography and password protocols: The multi-user case. In ACM Security (CCS’99), pages 63-72.
-
ACM Security (CCS’99)
, pp. 63-72
-
-
Boyarsky, M.1
-
14
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In STOC’98, pages 209-218.
-
STOC’98
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
15
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Info. Theory, 22(6):644-654, 1976.
-
(1976)
IEEE Trans. Info. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Info. Theory, 31:469-472, 1985.
-
(1985)
IEEE Trans. Info. Theory
, vol.31
, pp. 469-472
-
-
Elgamal, T.1
-
17
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO’99, pages 537-554.
-
CRYPTO’99
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
18
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
L. Gong. Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
-
(1995)
8Th IEEE Computer Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
19
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.2
Needham, R.M.3
Saltzer, J.H.4
-
20
-
-
0032218224
-
Public-key cryptography and password protocols
-
S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. In ACM Security (CCS’98), pages 122-131.
-
ACM Security (CCS’98)
, pp. 122-131
-
-
Halevi, S.1
Krawczyk, H.2
-
22
-
-
0013443819
-
Extended password key exchange protocols immune to dictionary attack
-
D. Jablon. Extended password key exchange protocols immune to dictionary attack. In WETICE’97 Workshop on Enterprise Security, 1997.
-
(1997)
WETICE’97 Workshop on Enterprise Security
-
-
Jablon, D.1
-
23
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
Dec, Proceedings of the 12th ACM Symposium on Operating System Principles
-
T. M. A. Lomas, L. Gong, J. H. Saltzer, and R. M. Needham. Reducing risks from poorly chosen keys. ACM Operating Systems Review, 23(5):14-18, Dec. 1989. Proceedings of the 12th ACM Symposium on Operating System Principles.
-
(1989)
ACM Operating Systems Review
, vol.23
, Issue.5
, pp. 14-18
-
-
Lomas, T.1
Gong, L.2
Saltzer, J.H.3
Needham, R.M.4
-
24
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proceedings of the Workshop on Security Protocols, 1997.
-
(1997)
Proceedings of the Workshop on Security Protocols
-
-
Lucks, S.1
-
26
-
-
0030648441
-
Number theoretic attacks on secure password schemes
-
S. Patel. Number theoretic attacks on secure password schemes. In Proceedings of IEEE Security and Privacy, pages 236-247, 1997.
-
(1997)
Proceedings of IEEE Security and Privacy
, pp. 236-247
-
-
Patel, S.1
-
27
-
-
3042666549
-
On formal models for secure key exchange
-
April
-
V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120. April, 1999.
-
(1999)
IBM Research Report RZ 3120
-
-
Shoup, V.1
-
29
-
-
0003331619
-
The secure remote password protocol
-
T. Wu. The secure remote password protocol. In NDSS’98, pages 97-111.
-
NDSS’98
, pp. 97-111
-
-
Wu, T.1
-
30
-
-
1942508825
-
A real world analysis of Kerberos password security
-
T. Wu. A real world analysis of Kerberos password security. In NDSS’99.
-
NDSS’99
-
-
Wu, T.1
|