ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
35
views
16
references
Top references
cited by
11
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
6,288
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography and Data Security
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
other
Author(s):
Michel Abdalla
,
David Pointcheval
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
16
Record
: found
Abstract
: not found
Article
: not found
Using encryption for authentication in large networks of computers
Roger Needham
,
Michael Schroeder
(1978)
0
comments
Cited
142
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Lower Bounds for Discrete Logarithms and Related Problems
Victor Shoup
(1997)
0
comments
Cited
118
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Authenticated Key Exchange Secure against Dictionary Attacks
Mihir Bellare
,
David Pointcheval
,
Phillip Rogaway
(2000)
0
comments
Cited
110
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 341-356
DOI:
10.1007/11507840_31
SO-VID:
ec1411ec-bf37-43c6-91b3-d239278ce063
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 357
Secure Biometric Authentication for Weak Computational Devices
pp. 141
Information-Theoretic Security Analysis of Physical Uncloneable Functions
pp. 341
Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication
Similar content
6,288
Short Exponent Diffie-Hellman Problems
Authors:
Takeshi Koshiba
,
Kaoru Kurosawa
A client-based user authentication and encryption algorithm for secure accessing to cloud servers based on modified Diffie-Hellman and RSA small-e
Authors:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption
Authors:
Joonsang Baek
,
Byoungcheon Lee
,
Kwangjo Kim
See all similar
Cited by
10
An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
Authors:
Mohammad Farash
,
Mahmoud Ahmadian Attari
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Authors:
Kim-Kwang Choo
,
Colin Boyd
,
Yvonne Hitchcock
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
Authors:
Cheng-Chi Lee
,
Chun-Ta Li
,
Che-Wei Hsu
See all cited by