Password-authenticated key agreement

Results: 56



#Item
1Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Password Authenticated Key Agreement for Contactless Smart Cards Dennis Kügler1, Heike Neumann2, Sebastian Stappert2, Markus Ullmann1, Matthias Vögeler2 1

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:14
2Proceedings  - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Proceedings - NN - Password Authenticated Key Agreement for Contactless Smart Cards

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-17 01:45:53
3Fabrice Ben Hamouda--Guichoux  Í 1 B rue du Pont RoyalBagneux, France

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
4Fabrice Ben Hamouda--Guichoux  Í 1 B rue du Pont RoyalBagneux, France

Fabrice Ben Hamouda--Guichoux Í 1 B rue du Pont RoyalBagneux, France

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2016-06-01 09:22:58
5Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-03-20 08:39:27
6Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-19 12:50:59
7Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2009-09-07 10:57:44
8Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) Anonymity and one-way authentication in key exchange protocols Ian Goldberg · Douglas Stebila ·

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-01-13 10:28:23
9Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Anonymity and one-way authentication in key exchange protocols Ian Goldberg1 , Douglas Stebila2 , and Berkant Ustaoglu3 1: Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada 2: Informa

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2012-01-15 19:52:05
10Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Secure Communications over Insecure Channels based on Short Authenticated Strings Serge Vaudenay http://lasecwww.epfl.ch/

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-29 14:38:56