-
5
-
-
0029543006
-
Efficient network authentication protocols: Lower bounds and optimal implementations
-
L. Gong. Efficient network authentication protocols: Lower bounds and optimal implementations. Distributed Computing, 9(3):131-145, 1995.
-
(1995)
Distributed Computing
, vol.9
, Issue.3
, pp. 131-145
-
-
Gong, L.1
-
6
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
June
-
L. Gong, M.A. Lomas, R. Needham, and J. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications, 11(5):648-656, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.3
Saltzer, J.4
-
8
-
-
3843051725
-
-
Naval Research Laboratory, October Request For Comments (RFC) 1704
-
N. Haller and R. Atkinson. On Internet Authentication. Naval Research Laboratory, October 1994. Request For Comments (RFC) 1704.
-
(1994)
On Internet Authentication
-
-
Haller, N.1
Atkinson, R.2
-
9
-
-
0030261758
-
Strong password-only authenticated key exchange
-
October
-
D. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, 26(5):5-26, October 1996.
-
(1996)
Computer Communication Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
10
-
-
0013443819
-
Extended password methods immune to dictionary attack
-
Cambridge, MA, June
-
D. Jablon. Extended password methods immune to dictionary attack. In WETICE '97 Enterprise Security Workshop, Cambridge, MA, June 1997.
-
(1997)
WETICE '97 Enterprise Security Workshop
-
-
Jablon, D.1
-
11
-
-
0012438383
-
Computation of discrete logarithms in prime fields
-
B.A. LaMacchia and A.M. Odlyzko. Computation of discrete logarithms in prime fields. Designs, Codes, and Cryptography, 1:46-62, 1991.
-
(1991)
Designs, Codes, and Cryptography
, vol.1
, pp. 46-62
-
-
LaMacchia, B.A.1
Odlyzko, A.M.2
-
12
-
-
0027663154
-
Elliptic curve cryptosystems and their implementations
-
A. Menezes and S.A. Vanstone. Elliptic curve cryptosystems and their implementations. Journal of Cryptology, 6(4):209-224, 1993.
-
(1993)
Journal of Cryptology
, vol.6
, Issue.4
, pp. 209-224
-
-
Menezes, A.1
Vanstone, S.A.2
-
14
-
-
0001312077
-
Message recovery for signature schemes based on the discrete logarithm problem
-
Springer-Verlag
-
K. Nyberg and R.A. Rueppel. Message recovery for signature schemes based on the discrete logarithm problem. In Advances in Cryptology| EUROCRYPT '94 Proceedings. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology| EUROCRYPT '94 Proceedings
-
-
Nyberg, K.1
Rueppel, R.A.2
-
15
-
-
84919085619
-
An improved algorithm for computing logarithms in gf(p) and its cryptographic significance
-
January
-
S.C. Pohling and M.E. Hellman. An improved algorithm for computing logarithms in gf(p) and its cryptographic significance. IEEE Transactions on Information Theory, 24(1):106-111, January 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-111
-
-
Pohling, S.C.1
Hellman, M.E.2
|