Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference38 articles.
1. [1] K. Yoneyama, “Password-based authenticated key exchange without centralized trusted setup,” ACNS 2014, pp.19-36, 2014. 10.1007/978-3-319-07536-5_2
2. [2] S.M. Bellovin and M. Merritt, “Encrypted key exchange: Password-based protocols secure against dictionary attacks,” IEEE S& P 1992, pp.72-84, 1992. 10.1109/risp.1992.213269
3. [3] M. Bellare, D. Pointcheval, and P. Rogaway, “Authenticated key exchange secure against dictionary attacks,” EUROCRYPT 2000, pp.139-155, 2000. 10.1007/3-540-45539-6_11
4. [4] V. Boyko, P.D. MacKenzie, and S. Patel, “Provably secure password-authenticated key exchange using Diffie-Hellman,” EUROCRYPT 2000, pp.156-171, 2000. 10.1007/3-540-45539-6_12
5. [5] P.D. MacKenzie, S. Patel, and R. Swaminathan, “Password-authenticated key exchange based on RSA,” ASIACRYPT 2000, pp.599-613, 2000. 10.1007/3-540-44448-3_46