[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Provably secure password-authenticated key exchange using Diffie-Hellman

V Boyko, P MacKenzie, S Patel - … on the Theory and Application of …, 2000 - Springer
When designing password-authenticated key exchange protocols (as opposed to key
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …

Strand spaces: Proving security protocols correct

FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …

[PDF][PDF] A future-adaptable password scheme.

N Provos, D Mazieres - USENIX Annual Technical Conference …, 1999 - usenix.org
Many authentication schemes depend on secret passwords. Unfortunately, the length and
randomness of user-chosen passwords remain fixed over time. In contrast, hardware …

Strand spaces: Why is a security protocol correct?

FJT Fábrega, JC Herzog… - Proceedings. 1998 IEEE …, 1998 - ieeexplore.ieee.org
A strand is a sequence of events; it represents either the execution of an action by a
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …

Public-key cryptography and password protocols

S Halevi, H Krawczyk - ACM Transactions on Information and System …, 1999 - dl.acm.org
We study protocols for strong authentication and key exchange in asymmetric scenarios
where the authentication server possesses~ a pair of private and public keys while the client …

Key agreement in ad hoc networks

N Asokan, P Ginzboorg - Computer communications, 2000 - Elsevier
We encounter new types of security problems in ad hoc networks because such networks
have little or no support infrastructure. In this paper we consider one such problem: a group …

RSA-OAEP is secure under the RSA assumption

E Fujisaki, T Okamoto, D Pointcheval… - Annual International …, 2001 - Springer
Abstract Recently Victor Shoup noted that there is a gap in the widely-believed security
result of OAEP against adaptive chosen-cipher-text attacks. Moreover, he showed that …

A framework for password-based authenticated key exchange

R Gennaro, Y Lindell - International Conference on the Theory and …, 2003 - Springer
In this paper we present a general framework for password-based authenticated key
exchange protocols, in the common reference string model. Our protocol is actually an …

Session-key generation using human passwords only

O Goldreich, Y Lindell - Journal of Cryptology, 2006 - Springer
We present session-key generation protocols in a model where the legitimate parties share
only a human-memorizable password, and there is no additional set-up assumption in the …