Author:
MacKenzie Philip,Patel Sarvar,Swaminathan Ram
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols.In STOC’98 [STO98], pages 419–428.
2. Donald Beaver.S ecure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. Journal of Cryptology, 4(2):75–122, 1991.
3. S.M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 72–84, 1992.
4. S.M. Bellovin and M. Merritt. Augumented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise.In CCS’93 [CCS93], pages 244–250.
5. V. Boyko, P. MacKenzie, and S. Patel. Provably-secure password authentication and key exchange using Diffie-Hellman.In EUROCRYPT2000 [EUR00].
Cited by
80 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献