D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. of Cryptology
, 4(2):75–122, 1991.MATHCrossRefGoogle Scholar
M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In STOC’98, pages 419–428.
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, pages 139–155.
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO’93, pages 232–249.
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security (CCS’93), pages 62–73.
M. Bellare and P. Rogaway. Optimal asymmetric encryption. In EUROCRYPT’94, pages 92–111.
M. Bellare and P. Rogaway. Provably secure session key distribution—the three party case. In STOC’95, pages 57–66.
S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of IEEE Security and Privacy, pages 72–84, 1992.
S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Security (CCS’93), pages 244–250.
S. Blake-Wilson, D. Johnson, and A. Menezes. Key agreement protocols and their security analysis. In Sixth IMA Intl. Conf. on Cryptography and Coding, 1997.
D. Boneh. The decision Diffie-Hellman problem. In Proceedings of the Third Algorithmic Number Theory Symposium
, volume 1423 of Lecture Notes in Computer Science
, pages 48–63. Springer-Verlag, 1998.CrossRefGoogle Scholar
M. Boyarsky. Public-key cryptography and password protocols: The multi-user case. In ACM Security (CCS’99), pages 63–72.
V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman (full version). http://www.bell-labs.com/user/philmac/research/pak.ps.gz
R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In STOC’98, pages 209–218.
W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Info. Theory
, 22(6):644–654, 1976.MATHCrossRefMathSciNetGoogle Scholar
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Info. Theory
, 31:469–472, 1985.MATHCrossRefMathSciNetGoogle Scholar
E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO’99, pages 537–554.
L. Gong. Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop, pages 24–29, 1995.
L. Gong, T. M. A. Lomas, R. M. Needham, and J. H. Saltzer. Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications
, 11(5):648–656, June 1993.CrossRefGoogle Scholar
S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. In ACM Security (CCS’98), pages 122–131.
D. Jablon. Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM
, 26(5):5–20, 1996.CrossRefGoogle Scholar
D. Jablon. Extended password key exchange protocols immune to dictionary attack. In WETICE’97 Workshop on Enterprise Security, 1997.
T. M. A. Lomas, L. Gong, J. H. Saltzer, and R. M. Needham. Reducing risks from poorly chosen keys. ACM Operating Systems Review
, 23(5):14–18, Dec. 1989. Proceedings of the 12th ACM Symposium on Operating System Principles.CrossRefGoogle Scholar
S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proceedings of the Workshop on Security Protocols, 1997.
P. MacKenzie and R. Swaminathan. Secure network authentication with password information. manuscript.
S. Patel. Number theoretic attacks on secure password schemes. In Proceedings of IEEE Security and Privacy, pages 236–247, 1997.
V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120. April, 1999.
M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM Operating System Review
, 29:22–30, 1995.CrossRefGoogle Scholar
T. Wu. The secure remote password protocol. In NDSS’98, pages 97–111.
T. Wu. A real world analysis of Kerberos password security. In NDSS’99.