Back to Results
First PageMeta Content
Password-authenticated key agreement / Password / Diffie–Hellman key exchange / Man-in-the-middle attack / IEEE P1363 / XTR / Password Authenticated Key Exchange by Juggling / Cryptographic protocols / Cryptography / SPEKE


The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica
Add to Reading List

Document Date: 2014-09-25 17:34:38


Open Document

File Size: 264,37 KB

Share Result on Facebook

Company

Entrust / Research in Motion / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Siamak F. Shahandashti Newcastle University / /

IndustryTerm

on-line attacker / latency network / web products / above solution / /

Organization

Newcastle University / /

Person

B. Alice Mallory / Alice Computes / Alice / Unless / Bob Computes / Siamak F. Shahandashti / /

Product

TruePass end-to-end web products / BlackBerry devices / SPEKE / BlackBerry / P1363 / TruePass / PAKE / /

Technology

PAKE protocols / PKI / hash-based MAC algorithm / SPEKE protocol / Password Authenticated Key Exchange protocol / /

URL

http /

SocialTag