A Real-World Analysis of Kerberos Password Security (1999)

Cached

Download Links

by Thomas Wu
Citations:57 - 0 self

Documents Related by Co-Citation

175 The secure remote password protocol – Thomas Wu - 1998
346 Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks – Steven M. Bellovin, Michael Merritt - 1992
163 Strong Password-Only Authenticated Key Exchange – David P. Jablon - 1996
208 Password Security: A Case History – Robert Morris, Ken Thompson - 1979
38 Extended Password Key Exchange Protocols Immune to Dictionary Attack – David P. Jablon - 1997
59 Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys – Stefan Lucks - 1997
307 Authenticated Key Exchange Secure Against Dictionary Attacks – Mihir Bellare, David Pointcheval, Phillip Rogaway - 2000
130 "Foiling the Cracker": A Survey of, and Improvements to, Password Security – Daniel V. Klein - 1990
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
55 Refinement and Extension of Encrypted Key Exchange – Michael Steiner, Gene Tsudik, Michael Waidner - 1995
113 Protecting Poorly Chosen Secrets from Guessing Attacks – Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer - 1993
36 Optimal Authentication Protocols Resistant to Password Guessing Attacks – Li Gong - 1995
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
106 Public-Key Cryptography and Password Protocols – Shai Halevi, Hugo Krawczyk - 1999
45 Password-authenticated key exchange based on RSA – Philip Mackenzie, Sarvar Patel, Ram Swaminathan - 2000
41 Number Theoretic Attacks On Secure Password Schemes – Sarvar Patel - 1997
127 Augmented Encrypted Key Exchange: a Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise – Steven M. Bellovin, Michael Merritt - 1993
147 Provably secure password-authenticated key exchange using Diffie-Hellman – Victor Boyko, Philip Mackenzie, Sarvar Patel - 2000
463 Entity Authentication and Key Distribution – Mihir Bellare, Phillip Rogaway - 1993