Efficiency in the Password-based Authenticated Key Exchange |
황정연
(고려대학교 정보보호 기술센터)
홍석희 (고려대학교 정보보호 기술센터) 박혜영 (고려대학교 정보보호 기술센터) 장상운 (고려대학교 정보보호 기술센터) 박영호 (세종 사이버 대학교) 류희수 (한국전자통신연구원) |
1 |
Extended Password Key Exchange Protocols Immune to Dictionary Attacks
/
|
2 |
The XTR public key system
/
DOI |
3 |
Use of elliptic curves in cryptography
/
DOI |
4 |
Elliptic Curves in Cryptography
/
|
5 |
The Secure Remote Password Protocol
/
|
6 |
Strong Password-Only Authenticated Key Exchange
/
DOI ScienceOn |
7 |
Provably secure password-authenticated key exchange using Diffie-Hellman
/
|
8 |
/
|
9 |
A Practical Public Key Cryptosystem Provably Secure Against Chosen Ciphertext Attack
/
DOI |
10 |
Efficient password-authenticated key exchange using human-memorable passwords
/
|
11 |
Faster Point Multiplication in Cryptology
/
DOI |
12 |
More Efficient Password-Authenticated Key Exchange
/
|
13 |
Password-authenticated key exchange based on RSA
/
DOI |
14 |
Encrypted key exchange: Password-based protocols secure against dictionary attacks
/
|
15 |
Elliptic curve cryptosystems
/
DOI ScienceOn |
16 |
The art of computer programming
/
|
17 |
Authenticated key exchange secure against dictionary attacks
/
|
18 |
Key improvements to XTR
/
DOI |
19 |
Session-key generation using human passwords only
/
DOI |
20 |
On-Line/Off-Line Digital Signatures
/
|
21 |
How to Play Any Mental Geme, or a Completeness Theorem for protocols with an Honest Majority
/
|
22 |
/
|
23 |
Key improvements to XTR
/
DOI |