Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication (original) (raw)
Related papers
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Password authenticated key exchange using hidden smooth subgroups
2005
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Lecture Notes in Computer Science, 2006
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
Authenticated Key Exchange Secure Against Dictionary Attacks
Threshold password-authenticated key exchange (extended abstract)
ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
On the Security of Methods for Protecting Password Transmission
Informatica, 2001
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Journal of Computer Science and Technology, 2009
2007
Strongly Leakage-Resilient Authenticated Key Exchange
Lecture Notes in Computer Science, 2016
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science, 2005
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography, 2008
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications, 2000
Trapdoor Functions from the Computational Diffie-Hellman Assumption
Lecture Notes in Computer Science, 2018
Efficient Password-Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science, 2006
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography, 2016
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks - SASN '05, 2005
IACR Cryptol. ePrint Arch., 2018
Rethinking the security of some authenticated group key agreement schemes
2004
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography, 2019
A new method for constructing key agreement schemes
Doklady Mathematics, 2007
Security of a leakage-resilient protocol for key establishment and mutual authentication
2007
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
More efficient password-authenticated key exchange
Topics in CryptologyCT-RSA 2001, 2001
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
2007
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
2010
Scalable Protocols for Authenticated Group Key Exchange
Journal of Cryptology, 2007
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
Lecture Notes in Computer Science, 2013
On the Security of Group Communication Schemes
Journal of Computer Security, 2007