-
2
-
-
0011716691
-
Limitations of the kerberos authentication system
-
Dallas, TX, Winter USENIX. A version of this paper was published in the October, 1990 issue of Computer Communications Review
-
Steven M. Bellovin and Michael Merritt. Limitations of the Kerberos authentication system. In USENIX Conference Proceedings, pages 253-267, Dallas, TX, Winter 1991. USENIX. A version of this paper was published in the October, 1990 issue of Computer Communications Review.
-
(1991)
USENIX Conference Proceedings
, pp. 253-267
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
85077731020
-
-
Don Davis. Personal communication
-
Don Davis. Personal communication.
-
-
-
-
7
-
-
85077748572
-
Kerberos with clocks adrift: History, protocols, and implementation
-
Salt Lake City, June
-
Don Davis, Daniel Geer, and Theodore Ts'o. Kerberos with clocks adrift: History, protocols, and implementation. In Proceedings of the 5th USENIX UNIX Security Symposium, Salt Lake City, June 1995.
-
(1995)
Proceedings of the 5th USENIX UNIX Security Symposium
-
-
Davis, D.1
Geer, D.2
Ts'o, T.3
-
8
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Dime and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Dime, W.1
Hellman, M.E.2
-
9
-
-
1542593353
-
Authentication and authenticated key exchanges
-
June
-
Whitfield Diffie, Paul C. Van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2(2):107-125, June 1992.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
10
-
-
0002805220
-
Undetectable online password guessing attacks
-
October
-
Yun Ding and Patrick Horster. Undetectable online password guessing attacks. Operating Systems Review, 29(4):77-86, October 1995.
-
(1995)
Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
12
-
-
7544231329
-
UNIX password security - Ten years later
-
G. Brassard, editor Springer-Verlag Lecture Notes in Computer Science No. 435
-
David C. Feldmeirer and Philip R. Karn. UNIX password security - ten years later. In G. Brassard, editor, Proc. CRYPTO 89, pages 44-63. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435.
-
(1990)
Proc. CRYPTO 89
, pp. 44-63
-
-
Feldmeirer, D.C.1
Karn, P.R.2
-
17
-
-
20344369243
-
Computation of discrete logarithms in prime fields
-
A.J. Menezes and S. A. Vanstone, editors Springer-Verlag Lecture Notes in Computer Science No. 537
-
B.A. LaMacchia and A.M. Odlyzko. Computation of discrete logarithms in prime fields. In A.J. Menezes and S. A. Vanstone, editors, Proc. CRYPTO 90, pages 616-618. Springer-Verlag, 1991. Lecture Notes in Computer Science No. 537.
-
(1991)
Proc. CRYPTO 90
, pp. 616-618
-
-
LaMacchia, B.A.1
Odlyzko, A.M.2
-
18
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
December
-
T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, and Roger M. Needham. Reducing risks from poorly chosen keys. In Proceedings of the 12th ACM Symposium on Operating System Principles, pages 14-18, December 1989.
-
(1989)
Proceedings of the 12th ACM Symposium on Operating System Principles
, pp. 14-18
-
-
Mark, T.1
Lomas, A.2
Gong, L.3
Saltzer, J.H.4
Needham, R.M.5
-
19
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
20
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. Clifford Neuman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Clifford Neuman, B.1
Ts'o, T.2
-
22
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
January
-
S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory, IT-24:106-110, January 1978.
-
(1978)
IEEE Trans. Inform. Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
25
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, Texas, February
-
J.G. Steiner, B.C. Neuman, and J.I. Schiller. Kerberos: an authentication service for open network systems. In Usenix Conference Proceedings, pages 191-202, Dallas, Texas, February 1988.
-
(1988)
Usenix Conference Proceedings
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
26
-
-
3142744801
-
On diffie-hellman key agreement with short exponents
-
(to appear). Springer-Verlag
-
P. C. van Oorschotand M. J. Wiener. On Diffie-Hellman key agreement with short exponents. In Proceedings of Eurocrypt '96 (to appear). Springer-Verlag, 1996.
-
(1996)
Proceedings of Eurocrypt '96
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
|