Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
暂无分享,去创建一个
[1] David Pointcheval,et al. Password-Based Authenticated Key Exchange in the Three-Party Setting , 2005, Public Key Cryptography.
[2] Masayuki Abe. Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings , 2006, CT-RSA.
[3] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[4] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[5] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[7] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[8] Wu Shu. Three-Party Password-Based Authenticated Key Exchange with Forward-Security , 2007 .
[9] David P. Jablon. Extended password key exchange protocols immune to dictionary attack , 1997, Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[10] Sarvar Patel,et al. Number theoretic attacks on secure password schemes , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Dongho Won,et al. Efficient Password-Authenticated Key Exchange Based on RSA , 2007, CT-RSA.
[12] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[13] Pil Joong Lee,et al. Advances in Cryptology — ASIACRYPT 2001 , 2001, Lecture Notes in Computer Science.
[14] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[15] Muxiang Zhang. New Approaches to Password Authenticated Key Exchange Based on RSA , 2004, ASIACRYPT.
[16] Hugo Krawczyk,et al. Public-key cryptography and password protocols , 1999 .
[17] Hung-Min Sun,et al. Three-party encrypted key exchange: attacks and a solution , 2000, OPSR.
[18] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[19] Dong Hoon Lee,et al. Password-Authenticated Key Exchange between Clients with Different Passwords , 2002, ICICS.
[20] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[21] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[22] Victor Shoup,et al. A computational introduction to number theory and algebra , 2005 .
[23] Sarvar Patel,et al. Password-authenticated key exchange based on RSA , 2000, International Journal of Information Security.