Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[3] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[4] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[5] Silvio Micali,et al. On-Line/Off-Line Digital Schemes , 1989, CRYPTO.
[6] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[7] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[9] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[10] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[11] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[12] Oded Goldreich,et al. On the Foundations of Modern Cryptography , 1997, CRYPTO.
[13] Stefan Lucks,et al. Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys , 1997, Security Protocols Workshop.
[14] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[15] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[16] D. Boneh. The Decision Diie-hellman Problem , 1998 .
[17] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[18] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[19] Jacques Stern,et al. Security Analysis of a Practical "on the fly" Authentication and Signature Generation , 1998, EUROCRYPT.
[20] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1998, CCS '98.
[21] Victor Shoup,et al. On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..
[22] Jacques Stern,et al. On the fly signatures based on factoring , 1999, CCS '99.
[23] Maurizio Kliban Boyarsky,et al. Public-key cryptography and password protocols: the multi-user case , 1999, CCS '99.
[24] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[25] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[26] Victor Boyko,et al. On all-or-nothing transforms and password-authenticated key exchange protocols , 2000 .
[27] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[28] Yehuda Lindell,et al. Session-Key Generation Using Human Passwords Only , 2001, CRYPTO.