Password-authenticated key agreement

Results: 56



#Item
41Cryptographic hash functions / Password-authenticated key agreement / One-way function / Password / Trapdoor function / RSA / Zero-knowledge proof / Random oracle / Isomorphism / Cryptography / Cryptographic protocols / Public-key cryptography

LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2013-06-04 22:24:52
42Portable software / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Google Chrome / Firefox / Dropbox / Crypt / Phishing / Software / Cryptographic protocols / Cryptography

How To Syn with Ali e 1 Feng Hao 1

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-06-15 13:41:44
43Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-12-17 06:46:52
44SPEKE / Password Authenticated Key Exchange by Juggling / Encrypted key exchange / Diffie–Hellman key exchange / Password / Public-key cryptography / IEEE P1363 / Key exchange / Authentication / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password Authenticated Key Exchange by Juggling - A key exchange protocol without PKI

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-16 17:16:56
45Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
46MQV / Key-agreement protocol / Public-key cryptography / Password-authenticated key agreement / Alice and Bob / XTR / Key authentication / Station-to-Station protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / YAK

On Robust Key Agreement Based on Public Key Authentication (Short Paper) Feng Hao Thales E-Security, Cambridge, UK [removed]

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-12-25 18:38:22
47System software / Software / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Secure Shell / Diffie–Hellman key exchange / OpenSSH / OpenSSL / Password / Cryptographic protocols / Cryptography / Cryptographic software

Session Key Retrieval in J-PAKE Implementations of OpenSSL and OpenSSH S´ebastien Martini – [removed] September 12, 2010 1

Add to Reading List

Source URL: seb.dbzteam.org

Language: English - Date: 2013-11-22 07:48:53
48Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Man-in-the-middle attack / XTR / IEEE P1363 / Public-key cryptography / Interlock protocol / Diffie–Hellman key exchange / Cryptography / Cryptographic protocols / SPEKE

Cryptanalysis of the Dragony Key Exchange Protocol Dylan Clarke, Feng Hao ∗

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-06-26 17:27:57
49Password-authenticated key agreement / SPEKE / Diffie–Hellman key exchange / Key-agreement protocol / Password / Encrypted key exchange / Public-key cryptography / Man-in-the-middle attack / GEC / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

Password Authenticated Key Exchange by Juggling Feng Hao⋆1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-04-30 07:42:46
50Password-authenticated key agreement / SPEKE / Password / Diffie–Hellman key exchange / Small subgroup confinement attack / Key-agreement protocol / XTR / Encrypted key exchange / Subgroup / Cryptographic protocols / Cryptography / Secure Remote Password protocol

On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed] Abstract—The small subgroup confinement attack works by

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-26 16:33:56
UPDATE