How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Cryptographic sealing for information secrecy and authentication
Communications of the ACM
Password security: a case history
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The Art of Computer Programming Volumes 1-3 Boxed Set
The Art of Computer Programming Volumes 1-3 Boxed Set
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
Public-key cryptography and password protocols
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Efficient and practical DHEKE protocols
ACM SIGOPS Operating Systems Review
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Secure password-based cipher suite for TLS
ACM Transactions on Information and System Security (TISSEC)
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
SPINS: security protocols for sensor networks
Wireless Networks
Simple authenticated key agreement protocol resistant to password guessing attacks
ACM SIGOPS Operating Systems Review
IAuth: An authentication system for Internet applications
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Security Enhancement for the "Simple Authentication Key Agreement Algorithm"
COMPSAC '00 24th International Computer Software and Applications Conference
More Efficient Password-Authenticated Key Exchange
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Session-Key Generation Using Human Passwords Only
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Maintaining Security in the Presence of Transient Faults
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Password-Authenticated Key Exchange Based on RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Proceedings of the 11th USENIX Security Symposium
An Adaptable and Reliable Authentication Protocol for Communication Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Security proofs for an efficient password-based key exchange
Proceedings of the 10th ACM conference on Computer and communications security
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
ACM SIGOPS Operating Systems Review
A hash-based strong-password authentication scheme without using smart cards
ACM SIGOPS Operating Systems Review
A secure and efficient strong-password authentication protocol
ACM SIGOPS Operating Systems Review
Password authenticated key exchange using hidden smooth subgroups
Proceedings of the 12th ACM conference on Computer and communications security
Provably secure password-based authentication in TLS
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Fortifying password authentication in integrated healthcare delivery systems
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A framework for password-based authenticated key exchange1
ACM Transactions on Information and System Security (TISSEC)
Access control protocols with two-layer architecture for wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A new two-server approach for authentication with short secrets
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A resilient access control scheme for secure electronic transactions
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Network randomization protocol: a proactive pseudo-random generator
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
A future-adaptive password scheme
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
A server-aided signature scheme for mobile commerce
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Proceedings of the 2007 ACM workshop on Digital identity management
ACM SIGACT News
International Journal of Applied Cryptography
International Journal of Wireless and Mobile Computing
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol
International Journal of Security and Networks
Provably secure browser-based user-aware mutual authentication over TLS
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Secure Password Authentication for Distributed Computing
Computational Intelligence and Security
Practical Password-Based Authenticated Key Exchange Protocol
Computational Intelligence and Security
A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Revisiting Bluetooth Security (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
A novel software key container in on-line media services
Computers and Electrical Engineering
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Hidden credential retrieval from a reusable password
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
User-aware provably secure protocols for browser-based mutual authentication
International Journal of Applied Cryptography
nPAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
Journal of Computer Science and Technology
Efficient and secure authenticated key exchange using weak passwords
Journal of the ACM (JACM)
Password authenticated key exchange protocols among diverse network domains
Computers and Electrical Engineering
Password Authenticated Key Exchange Based on RSA in the Three-Party Settings
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Intrusion-resilient key exchange in the bounded retrieval model
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Three-party password authenticated key agreement resistant to server compromise
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A framework for password-based authenticated key exchange
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Repairing the bluetooth pairing protocol
Proceedings of the 13th international conference on Security protocols
Faster and shorter password-authenticated key exchange
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Multi-factor password-authenticated key exchange
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Survey: leakage resilience and the bounded retrieval model
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Password based key exchange protocols on elliptic curves which conceal the public parameters
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
One-time-password-authenticated key exchange
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Federated secret handshakes with support for revocation
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A smart card based authentication protocol for strong passwords
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
J-PAKE: authenticated key exchange without PKI
Transactions on computational science XI
Password authenticated key exchange by juggling
Security'08 Proceedings of the 16th International conference on Security protocols
Password based key exchange with mutual authentication
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Security analysis of secure password authentication for keystroke dynamics
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Two-server password-only authenticated key exchange
Journal of Computer and System Sciences
An improvement on strong-password authentication protocols
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Mobile password system for enhancing usability-guaranteed security in mobile phone banking
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
One-Time verifier-based encrypted key exchange
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Two-Server password-only authenticated key exchange
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
The relationship between password-authenticated key exchange and other cryptographic primitives
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Secure password authentication for keystroke dynamics
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Password-Based user authentication protocol for mobile environment
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Secure protected password change scheme
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Securely propagating authentication in an ensemble of personal devices using single sign-on
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Threshold password-based authenticated group key exchange in gateway-oriented setting
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A method for making password-based key exchange resilient to server compromise
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
One-Round protocol for two-party verifier-based password-authenticated key exchange
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Efficient password-authenticated key exchange based on RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Perfectly secure password protocols in the bounded retrieval model
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Supplemental access control (PACE v2): security analysis of PACE integrated mapping
Cryptography and Security
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Efficient password authenticated key exchange via oblivious transfer
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Efficient password-based authenticated key exchange without public information
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
An identity authentication protocol in online social networks
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
BetterAuth: web authentication revisited
Proceedings of the 28th Annual Computer Security Applications Conference
Single password authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Go anywhere: user-verifiable authentication over distance-free channel for mobile devices
Personal and Ubiquitous Computing
Anonymous Shared Certificate Entity Authentication Protocol
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries who obtain the one-way encrypted password file may (i) successfully mimic (spoof) the host to the user, and (ii) mount dictionary attacks against the encrypted passwords, but cannot mimic the user to the host. Moreover, the important security properties of EKE are preserved—an active network attacker obtains insufficient information to mount dictionary attacks. Two ways to accomplish this are shown, one using digital signatures and one that relies on a family of commutative one-way functions.