[BUCH][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd

M Vanhoef, E Ronen - 2020 IEEE Symposium on Security and …, 2020 - ieeexplore.ieee.org
The WPA3 certification aims to secure home networks, while EAP-pwd is used by certain
enterprise Wi-Fi networks to authenticate users. Both use the Dragonfly handshake to …

Password-based authenticated key exchange in the three-party setting

M Abdalla, PA Fouque, D Pointcheval - International workshop on public …, 2005 - Springer
Password-based authenticated key exchange are protocols which are designed to be
secure even when the secret key or password shared between two users is drawn from a …

[BUCH][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Provably secure password-authenticated key exchange using Diffie-Hellman

V Boyko, P MacKenzie, S Patel - … on the Theory and Application of …, 2000 - Springer
When designing password-authenticated key exchange protocols (as opposed to key
exchange protocols authenticated using crypto-graphically secure keys), one must not allow …

[PDF][PDF] Diffie-Hellman key distribution extended to group communication

M Steiner, G Tsudik, M Waidner - … of the 3rd ACM Conference on …, 1996 - dl.acm.org
Abstract Ever since 2-party Diffie-Hellman key exchange was first proposed in 1976, there
have been efforts to extend its simplicity and elegance to a group setting. Notable solutions …

Strong password-only authenticated key exchange

DP Jablon - ACM SIGCOMM Computer Communication Review, 1996 - dl.acm.org
A new simple password exponential key exchange method (SPEKE) is described. It belongs
to an exclusive class of methods which provide authentication and key establishment over …

[PDF][PDF] The Secure Remote Password Protocol.

TD Wu - NDSS, 1998 - Citeseer
This paper presents a new password authentication and key-exchange protocol suitable for
authenticating users and exchanging keys over an untrusted network. The new protocol …

Key agreement in dynamic peer groups

M Steiner, G Tsudik, M Waidner - IEEE Transactions on Parallel …, 2000 - ieeexplore.ieee.org
As a result of the increased popularity of group-oriented applications and protocols, group
communication occurs in many different settings: from network multicasting to application …

Public-key cryptography and password protocols

S Halevi, H Krawczyk - ACM Transactions on Information and System …, 1999 - dl.acm.org
We study protocols for strong authentication and key exchange in asymmetric scenarios
where the authentication server possesses~ a pair of private and public keys while the client …