-
1
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT2000, pages 139-155.
-
EUROCRYPT2000
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
2
-
-
84945119254
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO '93, pages 232-249.
-
CRYPTO '93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security '93, pages 62-73.
-
ACM Security '93
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84948986458
-
Optimal asymmetric encryption
-
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In EUROCRYPT 94, pages 92-111.
-
EUROCRYPT 94
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security 92, pages 72-84.
-
IEEE Security
, vol.92
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
0027741529
-
Augumented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. M. Bellovin and M. Merritt. Augumented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Security '93, pages 244-250.
-
ACM Security '93
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
8
-
-
84937550984
-
Provably-secure password authentication and key exchange using Diffe-Hellman
-
V. Boyko, P. MacKenzie, and S. Patel. Provably-secure password authentication and key exchange using Diffe-Hellman. In EUROCRYPT2000, pages 156-171.
-
EUROCRYPT2000
, pp. 156-171
-
-
Boyko, V.1
Mackenzie, P.2
Patel, S.3
-
9
-
-
0031619016
-
The random oracle methodology, revisited
-
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In STOC '98, pages 209-218.
-
STOC '98
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
10
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
L. Gong. Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
-
(1995)
8Th IEEE Computer Security Foundations Workshop
, pp. 24
-
-
Gong, L.1
-
11
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Commu-nications, 11(5):648-656, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Commu-Nications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, T.M.2
Needham, R.M.3
Saltzer, J.H.4
-
12
-
-
84937582977
-
-
IEEE. IEEE1363, "Standard Specifications for Public Key Cryptography"
-
IEEE. IEEE1363, "Standard Specifications for Public Key Cryptography", 2000.
-
(2000)
-
-
-
13
-
-
0030261758
-
Strong password-only authenticated key exchange. ACM Computer Communication Review
-
D. Jablon. Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM, 26(5):5-20, 1996.
-
(1996)
ACM SIGCOMM
, vol.26
, Issue.5
, pp. 5-20
-
-
Jablon, D.1
-
14
-
-
0013443819
-
Extended password key exchange protocols immune to dictionary attack
-
D. Jablon. Extended password key exchange protocols immune to dictionary attack. In WETICE'97 Workshop on Enterprise Security, 1997.
-
(1997)
WETICE'97 Workshop on Enterprise Security
-
-
Jablon, D.1
-
15
-
-
0032319637
-
Lower bounds for zero knowledge on the internet
-
J. Kilian, E. Petrank, and C. Rackoff. Lower bounds for zero knowledge on the internet. In FOCS '98, pages 484-492.
-
FOCS '98
, pp. 484-492
-
-
Kilian, J.1
Petrank, E.2
Rackoff, C.3
-
18
-
-
0345686108
-
Open key exchange: How to defeat dictionary attacks without encrypting public keys
-
S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proceedings of the Workshop on Security Protocols, 1997.
-
(1997)
Proceedings of the Workshop on Security Protocols
-
-
Lucks, S.1
-
21
-
-
35048824789
-
On formal models for secure key exchange
-
V. Shoup. On formal models for secure key exchange. In ACM Security '99.
-
ACM Security '99
-
-
Shoup, V.1
-
23
-
-
84937582981
-
-
U. S. Department of Commerce/N. I. S. T., Springffeld, Virginia. FIPS186, "Digital Signature Standard", Federal Information Processing Standards Publication 186
-
U. S. Department of Commerce/N. I. S. T., Springffeld, Virginia. FIPS186, "Digital Signature Standard", Federal Information Processing Standards Publication 186, 1994.
-
(1994)
-
-
-
24
-
-
0003331619
-
The secure remote password protocol
-
T. Wu. The secure remote password protocol. In NDSS '98, pages 97-111.
-
NDSS '98
, pp. 97-111
-
-
Wu, T.1
|