IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange (original) (raw)

Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication

D. Catalano

Journal of Cryptology, 2007

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007

View PDFchevron_right

Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions

Hideki Imai

View PDFchevron_right

Universally Composable Password-Based Key Exchange

Ran Canetti

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Security Enhancement and Modular Treatment towards Authenticated Key Exchange

Changshe Ma

Lecture Notes in Computer Science, 2010

View PDFchevron_right

A note on leakage-resilient authenticated key exchange

Jung-Ah Hwang

IEEE Transactions on Wireless Communications, 2000

View PDFchevron_right

Authenticated Key Exchange Secure Against Dictionary Attacks

Satheesh Sharma

View PDFchevron_right

On the Security of Some Password-Based Key Agreement Schemes

Chris Mitchell

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Strong authenticated key exchange with auxiliary inputs

Willy Susilo

Designs, Codes and Cryptography, 2016

View PDFchevron_right

Password authenticated key exchange using hidden smooth subgroups

Zulfikar Ramzan

2005

View PDFchevron_right

Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model

Willy Susilo

Lecture Notes in Computer Science, 2013

View PDFchevron_right

A New Scheme for Key Exchange

Debajit Sensarma

ijmer.com

View PDFchevron_right

Threshold password-authenticated key exchange (extended abstract)

Markus Jakobsson

ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002

View PDFchevron_right

Strongly Leakage-Resilient Authenticated Key Exchange

Willy Susilo

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages

Olivier Blazy

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction

Suvradip Chakraborty

View PDFchevron_right

Authenticated Key Exchange and Key Encapsulation in the Standard Model

Tatsuaki Okamoto

Lecture Notes in Computer Science

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

Efficient Password-Authenticated Key Exchange Based on RSA

Moti Yung

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Leakage resilient eCK-secure key exchange protocol without random oracles

Tatsuaki Okamoto

Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

View PDFchevron_right

On the Security of Methods for Protecting Password Transmission

HungYu Chien

Informatica, 2001

View PDFchevron_right

Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme

Mahdi Aiash

2005

View PDFchevron_right

A provably secure one-pass two-party key establishment protocol

Konstantinos Chalkias

Information Security and …, 2008

View PDFchevron_right

A Method for Making Password-Based Key Exchange Resilient to Server Compromise

Zulfikar Ramzan

2006

View PDFchevron_right

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications

Hideki Imai

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005

View PDFchevron_right

A note on the strong authenticated key exchange with auxiliary inputs

Willy Susilo

Designs, Codes and Cryptography, 2017

View PDFchevron_right

An IBE Scheme to Exchange Authenticated Secret Keys

Waldyr Benits

2004

View PDFchevron_right

More efficient password-authenticated key exchange

sindulakshmi l.narayanan

Topics in Cryptology—CT-RSA 2001, 2001

View PDFchevron_right

On the security of a password-only authenticated three-party key exchange protocol

Juryon Paik

View PDFchevron_right

A New Secure Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Engineering and Technology, 2013

View PDFchevron_right

Strongly leakage resilient authenticated key exchange, revisited

Willy Susilo

Designs, Codes and Cryptography, 2019

View PDFchevron_right

Universally Composable Client-to-Client General Authenticated Key Exchange

Shinsaku Kiyomoto

Ipsj Digital Courier, 2007

View PDFchevron_right

Simple and efficient password-based authenticated key exchange protocol

Changshe Ma

Journal of Shanghai Jiaotong University Science, 2011

View PDFchevron_right