Sciweavers

361 search results - page 2 / 73
» Composition of Password-Based Protocols
Sort
View
NDSS
1999
IEEE
13 years 9 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
13 years 10 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
CTRSA
2005
Springer
128views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Simple Password-Based Encrypted Key Exchange Protocols
Michel Abdalla, David Pointcheval
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
13 years 10 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong