References
- Abdalla, M., Bresson, E., Chevassut, O., and Pointcheval, D.: 'Password-based group key exchange in a constant numher of rounds'. Proc. Intemational Workshop on Practice and Theory in Public Key Cryptography, PKC'06, LNCS 3958, pp 427-442
- Abdalla, M., Bohli, .J.M., Vasco, M., and Steinwandt, R.: '(Password) Authenticated Key Establishment: from 2-party to group', Proc. Theory of Cryptography Conference, TCC'07, LNCS 4392, 2007, pp. 499-514
- Abdalla, M., Fouque, P.A., and Pointcheval, D.: 'Password-based authenticated key exchange in the threeparty setting', Proc. Public Key Cryptography, PKC'05, LNCS 3383, 2005, pp. 65-84
- Abdalla, M., and Pointcheval, D.: 'Interactive diffiehellman assumptions with applications to password-based authentication', Proc, Financial Cryptography and Data Security, FC'05, LNCS 3570, 2005, pp. 341-356
- Boyarsky M.: 'Public-key cryptography and password protocols: the multi-user case', Proc, ACM Computer and Communication Security, CCS'99, 1999, pp. 63-72
- Bresson, E., Chevassut, O., and Pointcheval, D.: 'Security proofs for an efficient password-based key exchange', Proc. ACM. Computer and Communication Security, CCS'03, 2003, pp. 241-250
- Byun, .J.W., Leong, I.R., Lee D.H, and Park, C.S.: 'Password-authenticated key exchange between clients with different passwords', Proc. International Conference on Information and Communication Security, ICICS'02, LNCS 2513,2002, pp. 134-146
- Bellovin, S., and Merritt, M .. : 'Encrypted key exchange: password-based protocols secure against dictionary attacks, Proc. IEEE Symposium on Research in Security and Privacy, 1992, pp. 72-84
- Boyko, V., MacKenzie, P.D., and Patel S.: 'Provably secure password-authenticated key exchange using diffie-Hellman', Proc. Advances in Cryptology, EUROCRYPT'00, LNCS 1807, 2000, pp. 156-171
- Bellare. M.. Pointcheval, D., and Rogaway, P.: 'Authenticated key exchange secure against dictionary attacks', Proc. Advances in cryptology, Furocrypt'00, 2000, pp. 139-155
- Bellare, M., and Rogaway, P .. 'Provably secure session key distribution: the three party case', Proc. ACM Symposium on Theory of Computing, STOC'95, 1995, pp. 57-66
- Choo, K., Boyd, C, and Hitchcock, Y.: 'Examing indistinguishability-based proof models for key establishment protocols', Proc, Advances in Cryptology, ASIACRYPT'05, LNCS 3788, 2005, pp, 585-604
- Gong,, L., Lomas, M., Needham, R., and Saltzer ,J.: 'Protecting poorly chosen secrets from guessing attacks', IEEE Journal on Selected Areas in Communications, 1993, 11, (5), pp. 648-656 https://doi.org/10.1109/49.223865
- Ilalevi S., and Krawczyk II.: 'Public-key cryptography and password protocols', Proc, ACM Computer and Communication Sccurity, CCS'98, 1998, pp. 122-131
- Jain, A., Bolle, R., and Pankanti, S .. 'BIOMETRICS: Personal Identification in Networked Society', 1999, Kluwer Academic Publishers
- Katz, J., Ostrovsky, R., and Yung, M .. 'Forward secrecy in password-only key exchange protocols', Proc. Security in Communication Networks, 2002
- Katz J., Shrimpton T., and Jakobsson M .:'Threshold password-authenticated key exchange', Proc. Advances in Cryptology, Crypto'02, LNCS 2442, 2002, pp. 385-400
- Lin, C.L., Sun, H.M., and Hwang, T.: 'Three-party encrypted key exchange, attacks and a solution', ACM SIGOPS Operating Systems Review, 34, (4),2000, pp.12-20 https://doi.org/10.1145/506106.506108
- MacKenzie, P.: 'The PAK suite: protocols for password- authenticated key exchange', Submission to IEEE P1363.2, April 2002
- Raimondo M., Gennaro R.: 'Provably secure threshold password-authenticated key exchange', Proc. Advances in Cryptology, Eurocrypt' 03, LNCS 2656, 2003, pp. 507-523
- Steiner, M., Tsudik, G., and Waidner, M.: 'Refinement and extension of encrypted key exchange', ACM SIGOPS Operating Systems Review, 29, (3),1995, pp.22-30 https://doi.org/10.1145/206826.206834
- Wang, W., HU, L.: 'Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols', Proc, Indocrypt 2006, LNCS 4329, pp. 118-132