A Method to Enhance the Security of ZKIP with Weak Keys and Its Application
![]() |
양대헌 (ETRI 정보보호연구본부) |
1 |
Probably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
/
|
2 |
Fortifying key nrgotiation schems with poorly chosen passwords
/
DOI ScienceOn |
3 |
Authenticated key exchange secure against directionary attacks
/
|
4 |
Efficient Identification and Signatures for Smart cards, Advances in Cryptology
/
|
5 |
Augmented encrypted key exchanges: a password based protocol secure against dictionary attacks and password file compromise
/
|
6 |
Password-Authenticated Key Exchange Based on RSA
/
|
7 |
Encrypted key exchange: password based protocols secure against directionary attacks
/
|
8 |
Zero-knowledge proofs of identity
/
DOI ScienceOn |
9 |
/
|
10 |
Strong password-only authenticated key exchange
/
DOI ScienceOn |
11 |
New directions in cryptography
/
|
12 |
Time-stamps in Key Distribution Protocols
/
DOI |
13 |
Number Theoretic Attacks on Secure Password Schemes
/
|
14 |
Protocol fitted to security microprocessor minimizing both transmission and memory
/
|
15 |
Extended password Key Exchange Protocols Immune to Dictionary Attacks
/
|
16 |
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
/
|
17 |
A key distribution system equivalent to factoring
/
DOI ScienceOn |
18 |
An improved Algorithm for Computing Logarithms over GFp and its cryptographic significance
/
|
19 |
Secure Remote Password Protocol
/
|
20 |
On Diffie-Heilman key agreement with short exponents
/
|
21 |
Protecting poorly chosen sevrets from guessing attacks
/
DOI ScienceOn |
![]() |