Security Analysis of itSPAKE2+
暂无分享,去创建一个
[1] Tommaso Gagliardoni,et al. The Wonderful World of Global Random Oracles , 2018, IACR Cryptol. ePrint Arch..
[2] Hugo Krawczyk,et al. OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks , 2018, IACR Cryptol. ePrint Arch..
[3] Dennis Hofheinz,et al. GNUC: A New Universal Composability Framework , 2015, Journal of Cryptology.
[4] Ran Canetti,et al. Practical UC security with a Global Random Oracle , 2014, CCS.
[5] Craig Gentry,et al. A Method for Making Password-Based Key Exchange Resilient to Server Compromise , 2006, CRYPTO.
[6] Bodo Möller,et al. Provably secure password-based authentication in TLS , 2005, ASIACCS '06.
[7] Jean-Sébastien Coron,et al. Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.
[8] Moni Naor,et al. On Cryptographic Assumptions and Challenges , 2003, CRYPTO.
[9] Ran Canetti,et al. Universal Composition with Joint State , 2003, CRYPTO.
[10] Mihir Bellare,et al. The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES , 2001, CT-RSA.
[11] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[12] M. Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.