Author:
Becerra José,Ostrev Dimiter,Škrobot Marjan
Publisher
Springer International Publishing
Reference33 articles.
1. Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Research in Security and Privacy, SP 1992, pp. 72–84 (1992)
2. Lecture Notes in Computer Science;V Boyko,2000
3. MacKenzie, P.: The PAK suite: protocols for password-authenticated key exchange. DIMACS Technical report 2002–46 (2002)
4. Hao, F., Ryan, P.: J-PAKE: authenticated key exchange without PKI. Trans. Comput. Sci. 11, 192–206 (2010)
5. Abdalla, M., Benhamouda, F., MacKenzie, P.: Security of the J-PAKE password authenticated key exchange protocol. In: IEEE Symposium on Security and Privacy, SP 2015, pp. 571–587. IEEE Computer Society (2015)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Authenticated Key Exchange under Bad Randomness, Revisited;Mathematics;2023-06-15
2. TBVPAKE: An efficient and provably secure verifier-based PAKE protocol for IoT applications;Journal of Systems Architecture;2023-06
3. UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials;IEEE/ACM Transactions on Networking;2023
4. SoK;Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security;2022-05-30
5. Biometrics-Authenticated Key Exchange for Secure Messaging;Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security;2021-11-12