One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange
暂无分享,去创建一个
[1] Pil Joong Lee,et al. EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange , 2003, ACISP.
[2] Olivier Chevassut,et al. One-Time Verifier-Based Encrypted Key Exchange , 2005, Public Key Cryptography.
[3] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[4] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[5] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[6] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[7] Michael Waidner,et al. Secure password-based cipher suite for TLS , 2001, NDSS.
[8] Bodo Möller,et al. Provably secure password-based authentication in TLS , 2005, ASIACCS '06.
[9] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[10] Robert H. Deng,et al. Public Key Cryptography – PKC 2004 , 2004, Lecture Notes in Computer Science.
[11] Serge Vaudenay. Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings , 2005, Public Key Cryptography.
[12] David Naccache,et al. Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.
[13] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[15] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[16] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[17] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[18] Taekyoung Kwon,et al. Ultimate solution to authentication via memorable password , 2000 .
[19] David P. Jablon. Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[20] Emmanuel Bresson,et al. New Security Results on Encrypted Key Exchange , 2003, Public Key Cryptography.
[21] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[22] Philip D. MacKenzie,et al. More Efficient Password-Authenticated Key Exchange , 2001, CT-RSA.
[23] Philip D. MacKenzie,et al. Secure Network Authentication with Password Identification , 1999 .
[24] David Pointcheval,et al. Simple Password-Based Encrypted Key Exchange Protocols , 2005, CT-RSA.
[25] Rafail Ostrovsky,et al. Forward Secrecy in Password-Only Key Exchange Protocols , 2002, SCN.
[26] Taekyoung Kwon,et al. Secure agreement scheme for gxy via password authentication , 1999 .
[27] E. Bresson,et al. Security Proofs for an Ecien t Password-Based Key Exchange , 2003 .
[28] Emmanuel Bresson,et al. Security proofs for an efficient password-based key exchange , 2003, CCS '03.
[29] Du Jie. Secure remote password protocol and its security improvements , 2003 .