[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
Provably secure password-authenticated key exchange using Diffie-Hellman
V Boyko, P MacKenzie, S Patel - … on the Theory and Application of …, 2000 - Springer
When designing password-authenticated key exchange protocols (as opposed to key
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …
Strand spaces: Proving security protocols correct
FJT Fábrega, JC Herzog… - Journal of computer …, 1999 - content.iospress.com
A security protocol is an exchange of messages between two or more parties in which
encryption is used to provide authentication or to distribute cryptographic keys for new …
encryption is used to provide authentication or to distribute cryptographic keys for new …
[PDF][PDF] A future-adaptable password scheme.
N Provos, D Mazieres - USENIX Annual Technical Conference …, 1999 - usenix.org
Many authentication schemes depend on secret passwords. Unfortunately, the length and
randomness of user-chosen passwords remain fixed over time. In contrast, hardware …
randomness of user-chosen passwords remain fixed over time. In contrast, hardware …
Strand spaces: Why is a security protocol correct?
FJT Fábrega, JC Herzog… - Proceedings. 1998 IEEE …, 1998 - ieeexplore.ieee.org
A strand is a sequence of events; it represents either the execution of an action by a
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …
legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand …
Public-key cryptography and password protocols
S Halevi, H Krawczyk - ACM Transactions on Information and System …, 1999 - dl.acm.org
We study protocols for strong authentication and key exchange in asymmetric scenarios
where the authentication server possesses~ a pair of private and public keys while the client …
where the authentication server possesses~ a pair of private and public keys while the client …
Key agreement in ad hoc networks
N Asokan, P Ginzboorg - Computer communications, 2000 - Elsevier
We encounter new types of security problems in ad hoc networks because such networks
have little or no support infrastructure. In this paper we consider one such problem: a group …
have little or no support infrastructure. In this paper we consider one such problem: a group …
RSA-OAEP is secure under the RSA assumption
E Fujisaki, T Okamoto, D Pointcheval… - Annual International …, 2001 - Springer
Abstract Recently Victor Shoup noted that there is a gap in the widely-believed security
result of OAEP against adaptive chosen-cipher-text attacks. Moreover, he showed that …
result of OAEP against adaptive chosen-cipher-text attacks. Moreover, he showed that …
A framework for password-based authenticated key exchange
In this paper we present a general framework for password-based authenticated key
exchange protocols, in the common reference string model. Our protocol is actually an …
exchange protocols, in the common reference string model. Our protocol is actually an …
Session-key generation using human passwords only
O Goldreich, Y Lindell - Journal of Cryptology, 2006 - Springer
We present session-key generation protocols in a model where the legitimate parties share
only a human-memorizable password, and there is no additional set-up assumption in the …
only a human-memorizable password, and there is no additional set-up assumption in the …