Back to Results
First PageMeta Content
Password / Key management / Challenge-response authentication / Needham–Schroeder protocol / Known-plaintext attack / Kerberos / Key / RSA / Password-authenticated key agreement / Cryptography / Cryptographic protocols / Public-key cryptography


© IEEE[removed]Protecting Poorly Chosen Secrets from Guessing Attacks Li Gong, T. Mark A. Lomas, Roger M. Needham, and Jerome H. Saltzer June 8, 1993
Add to Reading List

Document Date: 2011-05-18 00:11:55


Open Document

File Size: 634,09 KB

Share Result on Facebook

City

Cambridge / Menlo Park / /

Company

SRI International / MasterCard / Needham / Computer Science Laboratory / IEEE Journal / Computer Laboratory / /

Country

United Kingdom / /

Event

Company Expansion / /

Facility

Massachusetts Institute of Technology / University of Cambridge / /

IndustryTerm

demonstration protocol / authentication server / cryptographic protocols / Internet Worm / public-key systems / possible solution / stored-password systems / encryption algorithms / modi ed protocol / exhaustive search / authentication protocols / /

OperatingSystem

UNIX / SunOS / /

Organization

University of Cambridge / Laboratory for Computer Science / Massachusetts Institute of Technology / /

Person

Li Gong / Jerome H. Saltzer June / T. Mark A. Lomas / Roger M. Needham / /

Position

teller / /

ProvinceOrState

California / Massachusetts / /

Technology

encryption / 5 Authentication Protocols / encryption algorithms / public key / authentication protocols / UNIX / ASCII / modi ed protocol / following protocol / ATM / UNIX operating system / private key / secret key / Kerberos Protocol / Demonstration Protocol / /

SocialTag