Password-authenticated key agreement

Results: 56



#Item
1Cryptography / ISO standards / Ubiquitous computing / Computer security / Prevention / Computer access control / Password / Contactless smart card / Challengeresponse authentication / Key-agreement protocol / Smart card / Key

Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:14
2Public-key cryptography / ISO standards / Ubiquitous computing / Elliptic curve cryptography / Cryptography / Key-agreement protocol / DiffieHellman key exchange / Elliptic curve DiffieHellman / Contactless smart card / Security token / Smart card / Forward secrecy

Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:53
3Eurocrypt / Password-authenticated key agreement / cole Normale Suprieure

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
4Cryptography / Public-key cryptography / Password-authenticated key agreement / Eurocrypt / International Cryptology Conference / Asiacrypt / Digital signature / RSA

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
5Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-20 08:39:27
6Cryptography / Computer access control / Cryptographic protocols / Password-authenticated key agreement / Password / Passwd / Encrypted key exchange / Crypt / Password Authenticated Key Exchange by Juggling

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:50:59
7Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2009-09-07 10:57:44
8Security / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Perfect forward secrecy / Authentication protocol / Authentication / Kerberos / Cryptographic protocols / Cryptography / Data

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
9Data / Password-authenticated key agreement / Key-agreement protocol / Public-key cryptography / Transport Layer Security / Authentication / Perfect forward secrecy / HTTP Secure / Kerberos / Cryptographic protocols / Cryptography / Security

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
10Cryptographic protocols / Block cipher modes of operation / Crypto++ / Password-authenticated key agreement / Cryptography / Public-key cryptography / Cryptographic software

Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-29 14:38:56
UPDATE