Authentication and authenticated key exchanges
Designs, Codes and Cryptography
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Optimal authentication protocols resistant to password guessing attacks
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Establishing identity without certification authorities
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
On diffie-hellman key agreement with short exponents
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Public-key cryptography and password protocols
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
Efficient and practical DHEKE protocols
ACM SIGOPS Operating Systems Review
Secure password-based cipher suite for TLS
ACM Transactions on Information and System Security (TISSEC)
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Three-party encrypted key exchange: attacks and a solution
ACM SIGOPS Operating Systems Review
Simple authenticated key agreement protocol resistant to password guessing attacks
ACM SIGOPS Operating Systems Review
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
Security Enhancement for the "Simple Authentication Key Agreement Algorithm"
COMPSAC '00 24th International Computer Software and Applications Conference
Elliptic Curve Based Password Authenticated Key Exchange Protocols
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Password Authentication Using Multiple Servers
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
More Efficient Password-Authenticated Key Exchange
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Password-Authenticated Key Exchange between Clients with Different Passwords
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Session-Key Generation Using Human Passwords Only
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Threshold Password-Authenticated Key Exchange
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
Password-Authenticated Key Exchange Based on RSA
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Extended Password Key Exchange Protocols Immune to Dictionary Attacks
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
ISC '02 Proceedings of the 5th International Conference on Information Security
Secure authentication system for public WLAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol
ACM SIGOPS Operating Systems Review
A hash-based strong-password authentication scheme without using smart cards
ACM SIGOPS Operating Systems Review
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
A secure and efficient strong-password authentication protocol
ACM SIGOPS Operating Systems Review
Secure key agreement protocols for three-party against guessing attacks
Journal of Systems and Software - Special issue: Software engineering education and training
Mechanisms for increasing the usability of grid security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Password authenticated key exchange using hidden smooth subgroups
Proceedings of the 12th ACM conference on Computer and communications security
Security analysis of a password-based authentication protocol proposed to IEEE 1363
Theoretical Computer Science
Secure authentication system for public WLAN roaming
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Pass-thoughts: authenticating with our minds
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
A framework for password-based authenticated key exchange1
ACM Transactions on Information and System Security (TISSEC)
Provably secure threshold password-authenticated key exchange
Journal of Computer and System Sciences
Password-based authentication and key distribution protocols with perfect forward secrecy
Journal of Computer and System Sciences
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Security flaws of remote user access over insecure networks
Computer Communications
Access control protocols with two-layer architecture for wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Potential weaknesses of AuthA password-authenticated key agreement protocols
Computer Standards & Interfaces
PDM: a new strong password-based protocol
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
PDM: a new strong password-based protocol
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
A server-aided signature scheme for mobile commerce
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Halting password puzzles: hard-to-break encryption from human-memorable keys
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Proceedings of the 7th symposium on Identity and trust on the Internet
Secure Password Authentication for Distributed Computing
Computational Intelligence and Security
Practical Password-Based Authenticated Key Exchange Protocol
Computational Intelligence and Security
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting
Information Security and Cryptology
An improved bilinear pairing based remote user authentication scheme
Computer Standards & Interfaces
Extending web applications with a lightweight zero knowledge proof authentication
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Revisiting Bluetooth Security (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
A novel software key container in on-line media services
Computers and Electrical Engineering
The design of e-traveler's check with efficiency and mutual authentication
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Merx: Secure and Privacy Preserving Delegated Payments
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Communication-efficient three-party protocols for authentication and key agreement
Computers & Mathematics with Applications
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
nPAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
Journal of Computer Science and Technology
Secure remote user access over insecure networks
Computer Communications
An efficient password authenticated key exchange protocol for imbalanced wireless networks
Computer Standards & Interfaces
Password authenticated key exchange protocols among diverse network domains
Computers and Electrical Engineering
TruWallet: trustworthy and migratable wallet-based web authentication
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Simple authenticated key agreement and protected password change protocol
Computers & Mathematics with Applications
HPAKE: Password Authentication Secure against Cross-Site User Impersonation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A New Protocol for the Nearby Friend Problem
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Provably secure password-authenticated key exchange using Diffie-Hellman
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
An improvement of VeriSign's key roaming service protocol
ICWE'03 Proceedings of the 2003 international conference on Web engineering
An improved password authentication key exchange protocol for 802.11 environment
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Provably secure threshold password-authenticated key exchange
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A framework for password-based authenticated key exchange
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A zero knowledge password proof mutual authentication technique against real-time phishing attacks
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Self-authorized public key management for home networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Repairing the bluetooth pairing protocol
Proceedings of the 13th international conference on Security protocols
Faster and shorter password-authenticated key exchange
TCC'08 Proceedings of the 5th conference on Theory of cryptography
A new secure scheme purposed for recognition and authentication protocol in bluetooth environment
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Efficient indifferentiable hashing into ordinary elliptic curves
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Password based key exchange protocols on elliptic curves which conceal the public parameters
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
An exquisite authentication scheme with key agreement preserving user anonymity
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
A smart card based authentication protocol for strong passwords
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
An efficient password authenticated key exchange protocol for WLAN and WiMAX
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
J-PAKE: authenticated key exchange without PKI
Transactions on computational science XI
LoKI: location-based PKI for social networks
Proceedings of the ACM SIGCOMM 2011 conference
Password authenticated key exchange by juggling
Security'08 Proceedings of the 16th International conference on Security protocols
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
An authentication scheme based upon face recognition for the mobile environment
CIS'04 Proceedings of the First international conference on Computational and Information Science
Secure sessions from weak secrets
Proceedings of the 11th international conference on Security Protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Security analysis of secure password authentication for keystroke dynamics
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
On the security of some password-based key agreement schemes
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Two-server password-only authenticated key exchange
Journal of Computer and System Sciences
Security analysis of password-authenticated key agreement protocols
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An improvement on strong-password authentication protocols
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
Various types of attacks and solutions regarding secure remote user access over insecure networks
ICCSA'06 Proceedings of the 6th international conference on Computational Science and Its Applications - Volume Part I
An improved fingerprint-based remote user authentication scheme using smart cards
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Delayed-key message authentication for streams
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Mobile password system for enhancing usability-guaranteed security in mobile phone banking
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Two-Server password-only authenticated key exchange
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Strengthening password-based authentication protocols against online dictionary attacks
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Secure password authentication for keystroke dynamics
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Password-Based user authentication protocol for mobile environment
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Ephemeral pairing on anonymous networks
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Threshold password-based authenticated group key exchange in gateway-oriented setting
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A method for making password-based key exchange resilient to server compromise
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Two's company, three is a crowd: a group-admission protocol for WSNs
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Efficient password-authenticated key exchange based on RSA
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
TruWalletM: secure web authentication on mobile platforms
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Constant-Round password-based group key generation for multi-layer ad-hoc networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
SP'11 Proceedings of the 19th international conference on Security Protocols
Password-Based authenticated key exchange
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Efficient password-based authenticated key exchange without public information
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A secret-key exponential key agreement protocol with smart cards
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Indifferentiable hashing to barreto---naehrig curves
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
ACM Transactions on Accessible Computing (TACCESS)
Single password authentication
Computer Networks: The International Journal of Computer and Telecommunications Networking
Composition of password-based protocols
Formal Methods in System Design
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
A new simple password exponential key exchange method (SPEKE) is described. It belongs to an exclusive class of methods which provide authentication and key establishment over an insecure channel using only a small password, without risk of offline dictionary attack. SPEKE and the closely-related Diffie-Hellman Encrypted Key Exchange (DH-EKE) are examined in light of both known and new attacks, along with sufficient preventive constraints. Although SPEKE and DH-EKE are similar, the constraints are different. The class of strong password-only methods is compared to other authentication schemes. Benefits, limitations, and tradeoffs between efficiency and security are discussed. These methods are important for several uses, including replacement of obsolete systems, and building hybrid two-factor systems where independent password-only and key-based methods can survive a single event of either key theft or password compromise.