Open key exchange: How to defeat dictionary attacks without encrypting public keys
- 1 January 1998
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Encrypted key exchange: password-based protocols secure against dictionary attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Optimal authentification protocols resistant to password guessing attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Entity authentication and authenticated key transport protocols employing asymmetric techniquesPublished by Springer Nature ,1998
- Strong password-only authenticated key exchangeACM SIGCOMM Computer Communication Review, 1996
- Refinement and extension of encrypted key exchangeACM SIGOPS Operating Systems Review, 1995
- Fortifying key negotiation schemes with poorly chosen passwordsElectronics Letters, 1994
- Protecting poorly chosen secrets from guessing attacksIEEE Journal on Selected Areas in Communications, 1993
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993