Password-Authenticated Key Exchange between Clients with Different Passwords |
변지욱
(고려대학교 정보보호기술연구센터(CIST))
정익래 (고려대학교 정보보호기술연구센터(CIST)) 이동훈 (고려대학교 정보보호기술연구센터(CIST)) |
1 |
Secure Remote Password Protocol
/
|
2 |
Provably Secure Password-Authentica ted Key Exchange Using Diffie-Hellman
/
|
3 |
Efficient kerberized multicast in a practical distributed setting
/
|
4 |
Encrypted key exchange:password based protocols secure against dictionary attacks
/
|
5 |
Key establishment protocols for secure mobile communications : A selective survey
/
|
6 |
Session-Key Generation Using Human Passwords Only
/
|
7 |
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
/
|
8 |
Pulbic key cryptography for cross-realm authentication in kerberos
/
|
9 |
A Real-World Analysis of Kerberos Password Security
/
|
10 |
On the Design of Security protocols for Mobile Communications
/
|
11 |
Dual-workfactor encrypted key exchange: Efficiency preventing password chaining attacks
/
|
12 |
Authenticated key exchange secure against dictionary attacks
/
|
13 |
Kerberos Authentication and Authorization System
/
|
14 |
Open key exchange: How to defeat dictionary attacks without encryting public keys
/
|
15 |
Refinement and extension of encrypted key exchange
/
ScienceOn |
16 |
Timestamps in key distribution protocols
/
|