ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Timestamps in key distribution protocols
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Comparing lower bounds on messages and rounds for two classes of key establishment protocols
ACM SIGCOMM Computer Communication Review
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
An extension to bellare and rogaway (1993) model: resetting compromised long-term keys
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Security enhancement of the communication-efficient AUTHMAC_DH protocols
Security and Communication Networks
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
Provably secure three-party authenticated key agreement protocol using smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries who obtain the one-way encrypted password file may (i) successfully mimic (spoof) the host to the user, and (ii) mount dictionary attacks against the encrypted passwords, but cannot mimic the user to the host. Moreover, the important security properties of EKE are preserved—an active network attacker obtains insufficient information to mount dictionary attacks. Two ways to accomplish this are shown, one using digital signatures and one that relies on a family of commutative one-way functions.