Secure Remote Password protocol

Results: 21



#Item
11Diffie–Hellman key exchange / Secure Remote Password protocol / Encrypted key exchange / Public-key cryptography / Internet Key Exchange / Salt / SPEKE / Password-authenticated key agreement / Cryptographic protocols / Cryptography / Password

The Second International Conference on Sensor Technologies and Applications Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks Dan Harkins Aruba Networks

Add to Reading List

Source URL: www.q.hscott.net

Language: English - Date: 2014-01-21 12:51:19
12Password / Hash chain / Certificate authority / Diffie–Hellman key exchange / Secure Remote Password protocol / Transport Layer Security / Cryptography / Cryptographic protocols / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Programming Project #2 Due: Friday, March 10th 2000, 11:59pm

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-24 22:56:17
13OpenSSL / System software / Secure Remote Password protocol / GNU General Public License / Free software / Copyright / Comparison of TLS Implementations / Crypto++ / Cryptographic software / Cryptography / Software

crypto Copyright © [removed]Ericsson AB. All Rights Reserved. crypto[removed]December 9, 2014 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: erlang.org

Language: English - Date: 2014-12-11 06:30:14
14OpenSSL / System software / Secure Remote Password protocol / GNU General Public License / Free software / Copyright / Comparison of TLS Implementations / Crypto++ / Cryptographic software / Cryptography / Software

crypto Copyright © [removed]Ericsson AB. All Rights Reserved. crypto 3.0 June 17, 2013 Copyright © [removed]Ericsson AB. All Rights Reserved.

Add to Reading List

Source URL: www.erlang.org

Language: English
15Information / Internet protocols / Password-authenticated key agreement / Password / Secure Remote Password protocol / Cryptographic protocols / Cryptography / Data

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions ? Jan Camenisch1 , Robert R. Enderlein1,2 , and Gregory Neven1 {jca,enr,nev}@zurich.ibm.com 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-05 05:22:56
16Password / Secure Remote Password protocol / SPEKE / Diffie–Hellman key exchange / Public-key cryptography / Salt / PKCS / Transport Layer Security / Password manager / Cryptography / Cryptographic protocols / Password-authenticated key agreement

2nd Annual PKI Research Workshop---Pre-Proceedings Intrusion-Tolerant Password-Enabled PKI§ Xunhua Wang Commonwealth Information Security Center & Department of Computer Science

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2003-04-24 19:07:24
17Computer network security / Password / Key management / Kerberos / Ticket Granting Ticket / Salt / Secure Remote Password protocol / Authentication server / Password manager / Cryptography / Computer security / Cyberwarfare

A Real-World Analysis of Kerberos Password Security Thomas Wu Computer Science Department Stanford University [removed]

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2003-10-02 14:08:12
18Password-authenticated key agreement / SPEKE / Password / Diffie–Hellman key exchange / Small subgroup confinement attack / Key-agreement protocol / XTR / Encrypted key exchange / Subgroup / Cryptographic protocols / Cryptography / Secure Remote Password protocol

On Small Subgroup Non-confinement Attack Feng Hao Thales E-Security, Cambridge, UK [removed] Abstract—The small subgroup confinement attack works by

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-26 16:33:56
19Public-key cryptography / Internet Relay Chat / HTTP Secure / Diffie–Hellman key exchange / Secure Remote Password protocol / Secure Shell / Cryptographic protocols / Cryptography / Secure multi-party computation

Canon-MPC, A System for Casual Non-Interactive Secure Multi-Party Computation Using Native Client ∗ Ayman Jarrous

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2014-03-04 08:27:08
20Security / Password / Challenge-response authentication / Digest access authentication / Secure Remote Password protocol / Man-in-the-middle attack / Zero-knowledge proof / OTPW / Security token / Cryptography / Cryptographic protocols / Computer security

PDF Document

Add to Reading List

Source URL: drmlab.org

Language: English - Date: 2008-12-04 05:05:52
UPDATE