-
1
-
-
0028446389
-
Fortifying key negotiation schemes with poorly chosen passwords
-
R. Anderson and T. Lomas, “Fortifying key negotiation schemes with poorly chosen passwords,” Electronics Letters, vol.30, no.13, pp.1040-1041, 1994
-
(1994)
Electronics Letters
, vol.30
, Issue.13
, pp. 1040-1041
-
-
Anderson, R.1
Lomas, T.2
-
3
-
-
0005078946
-
Entity authentication and key distribution
-
M. Bellare and P. Rogaway, “Entity authentication and key distribution,” In CRYPTO 93, 1993
-
(1993)
In CRYPTO
, vol.93
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols
-
M. Bellare, R. Canetti, and H. Krawczyk, “A modular approach to the design and analysis of authentication and key exchange protocols,” In STOC, pp.419-428, 1998
-
(1998)
In STOC
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
0010254150
-
Authenticated key exchange secure against dictionary attack
-
M. Bellare, D. Pointcheval and P. Rogaway, “Authenticated key exchange secure against dictionary attack,” In Eurocrypt 00, 2000
-
(2000)
Eurocrypt 00
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
8
-
-
0027741529
-
Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise
-
S. Bellovin and M. Merritt, “Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise,” In ACM Conference on Computer and Communications Security, pp. 244-250, 1993
-
(1993)
In ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
10
-
-
3042657129
-
Provably secure password authenticated key exchange using Diffie-Hellman
-
V. Boyko, P. MacKenzie and S. Patel, “Provably secure password authenticated key exchange using Diffie-Hellman,” In Eurocrypt 00, 2000
-
(2000)
Eurocrypt 00
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
11
-
-
47349130323
-
Secure Password-Based Cipher Suite for TLS
-
February 2-4
-
P. Buhler, T. Eirich, M. Steiner and M. Waidner, “Secure Password-Based Cipher Suite for TLS,” In Network and Distributed System Security Symposium, February 2-4, 2000
-
(2000)
Network and Distributed System Security Symposium
-
-
Buhler, P.1
Eirich, T.2
Steiner, M.3
Waidner, M.4
-
12
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. Denning and G. Sacco, “Timestamps in key distribution protocols,” Communications of the ACM, vol.24, no.8, pp.533-536, 1981
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
13
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol.22, no.6, pp.644-654, November 1976
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
14
-
-
0002805220
-
Undetectable on-line password guessing attacks
-
October
-
Y. Ding and P. Hoster, “Undetectable on-line password guessing attacks,” ACM Operating Systems Review, vol.29, no.4, pp.77-86, October 1995
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Hoster, P.2
-
15
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
June
-
L. Gong, M. Lomas, R. Needham, and J. Saltzer, “Protecting poorly chosen secrets from guessing attacks,” IEEE Journal on Selected Areas in Communications, vol.11, no.5, pp.648-656, June 1993
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.2
Needham, R.3
Saltzer, J.4
-
16
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
June
-
L. Gong, “Optimal authentication protocols resistant to password guessing attacks,” In IEEE Computer Security Foundation Workshop, pp. 24-29, June 1995
-
(1995)
IEEE Computer Security Foundation Workshop
, pp. 24-29
-
-
Gong, L.1
-
18
-
-
0030261758
-
Strong password-only authenticated key exchange
-
D. Jablon, “Strong password-only authenticated key exchange,” ACM Computer Communications Review, vol.26, no.5, pp.5-26, 1996
-
(1996)
ACM Computer Communications Review
, vol.26
, Issue.5
, pp. 5-26
-
-
Jablon, D.1
-
20
-
-
0031680336
-
Efficient key exchange and authentication protocols protecting weak secrets
-
January
-
T. Kwon and J. Song, “Efficient key exchange and authentication protocols protecting weak secrets,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E81-A, no.1, pp.156-163, January 1998
-
(1998)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E81-A
, Issue.1
, pp. 156-163
-
-
Kwon, T.1
Song, J.2
-
21
-
-
0032640752
-
Secure agreement scheme for gKk>q via password authentication
-
27th May
-
T. Kwon and J. Song, “Secure agreement scheme for gKk>q via password authentication,” Electronics Letters, vol.35, no.11, pp.892-893, 27th May 1999
-
(1999)
Electronics Letters
, vol.35
, Issue.11
, pp. 892-893
-
-
Kwon, T.1
Song, J.2
-
23
-
-
84958601057
-
A key recovery attack on discrete log-based schemes using a prime order subgroup
-
C. Lim and P. Lee, “A key recovery attack on discrete log-based schemes using a prime order subgroup,” In CRYPTO, pp.249-263, 1997
-
(1997)
In CRYPTO
, pp. 249-263
-
-
Lim, C.1
Lee, P.2
-
24
-
-
0024940229
-
Reducing risks from poorly chosen keys
-
M. Lomas, L. Gong, J. Saltzer, and R. Needham, “Reducing risks from poorly chosen keys,” ACM Symposium on Operating System Principles, pp.14-18, 1989
-
(1989)
ACM Symposium on Operating System Principles
, pp. 14-18
-
-
Lomas, M.1
Gong, L.2
Saltzer, J.3
Needham, R.4
-
25
-
-
0345686108
-
Open key exchange: how to defeat dictionary attacks without encrypting public keys
-
April 7-9
-
S. Lucks, “Open key exchange: how to defeat dictionary attacks without encrypting public keys,” The Workshop on Security Protocols, April 7-9, 1997
-
(1997)
The Workshop on Security Protocols
-
-
Lucks, S.1
-
27
-
-
0004192381
-
-
CRC Press,Inc
-
A. Menezes, P. van Oorschot and S. Van-stone, Handbook of applied cryptography, CRC Press,Inc., pp.517-518, 1997
-
(1997)
Handbook of applied cryptography
, pp. 517-518
-
-
Menezes, A.1
van Oorschot, P.2
Van-stone, S.3
-
28
-
-
3142744801
-
On Diffie-Hellman key agreement with short exponents
-
P. van Oorschot and M. Wiener, “On Diffie-Hellman key agreement with short exponents,” In Eurocrypt 96, pp. 332-343, 1996
-
(1996)
In Eurocrypt
, vol.96
, pp. 332-343
-
-
van Oorschot, P.1
Wiener, M.2
-
30
-
-
85180809254
-
Strong Password-Based Authentication Using Pseudorandom Moduli
-
R. Perlman and C. Kaufman, “Strong Password-Based Authentication Using Pseudorandom Moduli,” IETF Internet Draft, 2000, available from http://search.ietf.org/internetdrafts/draft-perlman-strongpass-00.txt
-
(2000)
IETF Internet Draft
-
-
Perlman, R.1
Kaufman, C.2
-
31
-
-
84919085619
-
An improved al- (gorithm for computing logarithms over ø ù L * and its cryptographic significance
-
S. Pohlig and M. Hellman, “An improved al- (gorithm for computing logarithms over ø ù L * and its cryptographic significance,” IEEE Transactions on Information Theory, vol.24, no.1, pp.106-110, 1978
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
32
-
-
84966238549
-
Monte Carlo methods for index computation GIHKJ L
-
J. Pollard, “Monte Carlo methods for index computation GIHKJ L,” Mathematics of Computation, vol.32, pp.918-924, 1978
-
(1978)
Mathematics of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.1
-
33
-
-
38149011042
-
-
Technical report from University of Cambridge and University of Hertfordshire
-
M. Roe, B. Christianson and D. Wheeler, “Secure sessions from weak secrets,” Technical report from University of Cambridge and University of Hertfordshire, 1998, available from http://www.ccsr.cam.ac.uk/techreports/tr4/index.html
-
(1998)
Secure sessions from weak secrets
-
-
Roe, M.1
Christianson, B.2
Wheeler, D.3
-
34
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
C. Schnorr, “Efficient identification and signatures for smart cards,” In CRYPTO 89, pp.239-251, 1989
-
(1989)
In CRYPTO
, vol.89
, pp. 239-251
-
-
Schnorr, C.1
-
35
-
-
0002839106
-
Refinement and extension of encrypted key exchange
-
M. Steiner, G. Tsudik, and M. Waidner, “Refinement and extension of encrypted key exchange,” ACM Operating Systems Review, vol.29, no.3, pp.22-30, 1995
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
36
-
-
0027834441
-
Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks
-
G. Tsudik and E. van Herreweghen, “Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks,” In IEEE Computer Security Foundation Workshop, pp.136-142, 1993
-
(1993)
In IEEE Computer Security Foundation Workshop
, pp. 136-142
-
-
Tsudik, G.1
van Herreweghen, E.2
-
37
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
June
-
V. Voydock and S. Kent, “Security mechanisms in high-level network protocols,” Computing Surveys, vol.15, no.2, pp.135-171, June 1983
-
(1983)
Computing Surveys
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.1
Kent, S.2
|