• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,597
Next 10 →

Authentication and Authenticated Key Exchanges

by Whitfield Diffie, Paul C. van Oorschot, Michael J. Wiener , 1992
"... We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing protoc ..."
Abstract - Cited by 310 (6 self) - Add to MetaCart
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric techniques. A simple, efficient protocol referred to as the station-to-station (STS) protocol is introduced, examined in detail, and considered in relation to existing

Authenticated Key Exchange Secure Against Dictionary Attacks

by Mihir Bellare, David Pointcheval, Phillip Rogaway , 2000
"... Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. While several such protocols have been suggested, the underlying theory has been laggi ..."
Abstract - Cited by 402 (35 self) - Add to MetaCart
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a space so small that an adversary might well enumerate, off line, all possible passwords. While several such protocols have been suggested, the underlying theory has been

An Efficient Protocol for Authenticated Key Agreement

by Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott Vanstone - Designs, Codes and Cryptography , 1998
"... This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two modification ..."
Abstract - Cited by 161 (4 self) - Add to MetaCart
This paper proposes a new and efficient two-pass protocol for authenticated key agreement in the asymmetric (public-key) setting. The protocol is based on Diffie-Hellman key agreement and can be modified to work in an arbitrary finite group and, in particular, elliptic curve groups. Two

Entity Authentication and Authenticated Key

by Exchange With Tree, Markus Volkmer , 2006
"... This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have b ..."
Abstract - Add to MetaCart
This paper provides the first analytical and practical treatment of entity authentication and authenticated key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been discussed as an alternative concept for secure symmetric key exchange. Several attacks have

Stronger Security of Authenticated Key Exchange

by Brian Lamacchia, Kristin Lauter, Anton Mityagin - In Provable Security: First International Conference, ProvSec 2007, volume 4784 of LNCS , 2007
"... Recent work by Krawczyk [10] and Menezes [14] has highlighted the importance of under-standing well the guarantees and limitations of formal security models when using them to prove the security of protocols. In this paper we focus on security models for authenticated key exchange (AKE) protocols. W ..."
Abstract - Cited by 110 (0 self) - Add to MetaCart
Recent work by Krawczyk [10] and Menezes [14] has highlighted the importance of under-standing well the guarantees and limitations of formal security models when using them to prove the security of protocols. In this paper we focus on security models for authenticated key exchange (AKE) protocols

Entity Authentication and Key Distribution

by Mihir Bellare, Phillip Rogaway , 1993
"... Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment of these p ..."
Abstract - Cited by 578 (13 self) - Add to MetaCart
Entity authentication and key distribution are central cryptographic problems in distributed computing -- but up until now, they have lacked even a meaningful definition. One consequence is that incorrect and inefficient protocols have proliferated. This paper provides the first treatment

Multi-factor authenticated key exchange

by David Pointcheval, Sébastien Zimmer - In ACNS 2008, LNCS 5037 , 2008
"... Abstract In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications. ..."
Abstract - Cited by 19 (2 self) - Add to MetaCart
Abstract In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security model for multi-factor authenticated key exchange, which combines a password, a secure device, and biometric authentications

Password-Based Authenticated Key Exchange in the . . .

by Abdalla, Pierre-alain Fouque, David Pointcheval - PKC 2005: 8th International Workshop on Theory and Practice in Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science , 2005
"... Password-based authenticated key exchange are protocols which are designed to be secure even when the secret key or password shared between two users is drawn from a small set of values. Due to the low entropy of passwords, such protocols are always subject to on-line guessing attacks. In these a ..."
Abstract - Cited by 12 (1 self) - Add to MetaCart
Password-based authenticated key exchange are protocols which are designed to be secure even when the secret key or password shared between two users is drawn from a small set of values. Due to the low entropy of passwords, such protocols are always subject to on-line guessing attacks

Strong Password-Only Authenticated Key Exchange

by David P. Jablon , 1996
"... ..."
Abstract - Cited by 190 (0 self) - Add to MetaCart
Abstract not found

Methods For Authenticating Keys

by James Kirby
"... With the evolution of the business world from a paper-based to an electronic environment, security has taken an even more prominent role than ever before. Whether bank transactions are being encrypted or emails being protected, a business must have faith in the underlying technology infrastructure a ..."
Abstract - Add to MetaCart
With the evolution of the business world from a paper-based to an electronic environment, security has taken an even more prominent role than ever before. Whether bank transactions are being encrypted or emails being protected, a business must have faith in the underlying technology infrastructure and must have the strongest belief that its information is safe from adversaries of any kind. Through the development of information security it is possible to achieve this goal. However as we will see in this report, the solution is not a simple one and many factors must firstly be taken into consideration. 1
Next 10 →
Results 1 - 10 of 6,597
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University