Timestamps in key distribution protocols
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Threshold Password-Authenticated Key Exchange
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
The Decision Diffie-Hellman Problem
ANTS-III Proceedings of the Third International Symposium on Algorithmic Number Theory
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
EPA: an efficient password-based protocol for authenticated key exchange
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Hi-index | 0.00 |
EAP (Extensible Authentication Protocol) provides authentication for each entity based on IEEE Std 802.1x wireless Local Area Networks and RADIUS/DIAMETER protocol and uses authentication certificates, passwords, and dual schemes (e.g., password and token). A password-based authentication scheme for authorized key exchange is a widely used user authentication scheme because it is easy to memorize, convenient, and portable. A specific hardware device is also unnecessary. This paper discusses user authentication via public networks and proposes the Split Password-based Authenticated Key Exchange (SPAKE), which is ideal for session key exchange when using secure encoded telecommunications. A secure EAP authentication framework, EAP-SPAKE, is also suggested.