Computer
More Efficient Password-Authenticated Key Exchange
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Proceedings of the International Workshop on Security Protocols
Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
Proceedings of the 5th International Workshop on Security Protocols
Auditing against Impossible Abstractions
Proceedings of the 7th International Workshop on Security Protocols
Broadening the Scope of Fault Tolerance within Secure Services
Revised Papers from the 8th International Workshop on Security Protocols
Hi-index | 0.00 |
This story starts with a specific protocol, which we thought up in the Eagle back in 1997, and which was inspired by an earlier Security Protocol Workshop. Here's the protocol, which is intended to leverage a weak shared password k up into a fresh random strong shared secret s: