Encrypted key exchange: password-based protocols secure against dictionary attacks
Top Cited Papers
- 2 January 2003
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Computation of discrete logarithms in prime fieldsDesigns, Codes and Cryptography, 1991
- A note on redundancy in encrypted messagesACM SIGCOMM Computer Communication Review, 1990
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- TheUNIXSystem: UNIXOperating System SecurityAT&T Bell Laboratories Technical Journal, 1984
- How to expose an eavesdropperCommunications of the ACM, 1984
- Protocols for Data SecurityComputer, 1983
- Password securityCommunications of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976