Efficient Password Authenticated Key Exchange via Oblivious Transfer
暂无分享,去创建一个
Ran Canetti | Vinod Vaikuntanathan | Dana Dachman-Soled | Hoeteck Wee | R. Canetti | V. Vaikuntanathan | H. Wee | Dana Dachman-Soled
[1] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[2] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Applications , 1989, CRYPTO.
[3] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[4] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[5] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[6] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[7] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[8] Sarvar Patel,et al. Password-Authenticated Key Exchange Based on RSA , 2000, ASIACRYPT.
[9] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[10] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[11] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[12] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[13] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[14] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, CRYPTO.
[15] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[16] Aggelos Kiayias,et al. Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.
[17] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[18] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[19] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[20] Stefan Wolf,et al. Oblivious Transfer Is Symmetric , 2006, EUROCRYPT.
[21] Guang Gong,et al. Password Based Key Exchange with Mutual Authentication , 2004, IACR Cryptol. ePrint Arch..
[22] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[23] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[24] Yael Tauman Kalai. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, EUROCRYPT.
[25] Yehuda Lindell,et al. Universally Composable Password-Based Key Exchange , 2005, EUROCRYPT.
[26] Jonathan Katz,et al. Two-server password-only authenticated key exchange , 2005, J. Comput. Syst. Sci..
[27] Serge Vaudenay,et al. Advances in Cryptology - EUROCRYPT 2006 , 2006, Lecture Notes in Computer Science.
[28] Emmanuel Bresson,et al. Password-Based Group Key Exchange in a Constant Number of Rounds , 2006, Public Key Cryptography.
[29] Aggelos Kiayias,et al. Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.
[30] Kefei Chen,et al. Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.
[31] David Pointcheval,et al. A Scalable Password-Based Group Key Exchange Protocol in the Standard Model , 2006, ASIACRYPT.
[32] Kevin S. McCurley,et al. A key distribution system equivalent to factoring , 1988, Journal of Cryptology.
[33] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, Journal of Cryptology.
[34] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[35] Salil P. Vadhan,et al. Simpler Session-Key Generation from Short Random Passwords , 2004, Journal of Cryptology.
[36] Rosario Gennaro,et al. Faster and Shorter Password-Authenticated Key Exchange , 2008, TCC.
[37] Daniel Wichs,et al. Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer , 2009, IACR Cryptol. ePrint Arch..
[38] Tal Malkin. Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings , 2008, CT-RSA.
[39] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[40] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[41] David Pointcheval,et al. Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework , 2008, CT-RSA.
[42] Jonathan Katz,et al. Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices , 2009, ASIACRYPT.
[43] David Pointcheval,et al. Smooth Projective Hashing for Conditionally Extractable Commitments , 2009, CRYPTO.
[44] Eike Kiltz,et al. The Group of Signed Quadratic Residues and Applications , 2009, CRYPTO.
[45] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[46] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[47] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[48] Jonathan Katz,et al. A new framework for efficient password-based authenticated key exchange , 2010, CCS '10.
[49] Yael Tauman Kalai,et al. Smooth Projective Hashing and Two-Message Oblivious Transfer , 2005, Journal of Cryptology.
[50] Jan Camenisch,et al. Credential Authenticated Identification and Key Exchange , 2010, IACR Cryptol. ePrint Arch..
[51] Yehuda Lindell,et al. Secure Computation Without Authentication , 2005, Journal of Cryptology.
[52] Sarvar Patel,et al. Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.
[53] Rafail Ostrovsky,et al. Password-Authenticated Session-Key Generation on the Internet in the Plain Model , 2010, CRYPTO.
[54] Jonathan Katz,et al. Round-Optimal Password-Based Authenticated Key Exchange , 2011, TCC.