IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange (original) (raw)
Related papers
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
Journal of Cryptology, 2007
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
Universally Composable Password-Based Key Exchange
Lecture Notes in Computer Science, 2005
Security Enhancement and Modular Treatment towards Authenticated Key Exchange
Lecture Notes in Computer Science, 2010
A note on leakage-resilient authenticated key exchange
IEEE Transactions on Wireless Communications, 2000
Authenticated Key Exchange Secure Against Dictionary Attacks
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
Strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography, 2016
Password authenticated key exchange using hidden smooth subgroups
2005
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model
Lecture Notes in Computer Science, 2013
ijmer.com
Threshold password-authenticated key exchange (extended abstract)
ADVANCES IN CRYPTOLOGY CRYPTO 2002 PROCEEDINGSBook Series LECTURE NOTES IN COMPUTER SCIENCE, 2002
Strongly Leakage-Resilient Authenticated Key Exchange
Lecture Notes in Computer Science, 2016
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
Lecture Notes in Computer Science, 2013
Authenticated Key Exchange and Key Encapsulation in the Standard Model
Lecture Notes in Computer Science
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
Efficient Password-Authenticated Key Exchange Based on RSA
Lecture Notes in Computer Science, 2006
Leakage resilient eCK-secure key exchange protocol without random oracles
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
On the Security of Methods for Protecting Password Transmission
Informatica, 2001
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
2005
A provably secure one-pass two-party key establishment protocol
Information Security and …, 2008
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
2006
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005
A note on the strong authenticated key exchange with auxiliary inputs
Designs, Codes and Cryptography, 2017
An IBE Scheme to Exchange Authenticated Secret Keys
2004
More efficient password-authenticated key exchange
Topics in CryptologyCT-RSA 2001, 2001
On the security of a password-only authenticated three-party key exchange protocol
A New Secure Protocol for Authenticated Key Agreement
International Journal of Engineering and Technology, 2013
Strongly leakage resilient authenticated key exchange, revisited
Designs, Codes and Cryptography, 2019
Universally Composable Client-to-Client General Authenticated Key Exchange
Ipsj Digital Courier, 2007
Simple and efficient password-based authenticated key exchange protocol
Journal of Shanghai Jiaotong University Science, 2011