![Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling](https://www.pdfsearch.io/img/99ed7a27f5bbe0e48c082907dd9541f2.jpg)
| Document Date: 2010-12-17 06:46:52 Open Document File Size: 238,75 KBShare Result on Facebook
City Cambridge / / Company Thales / G. Proof / Phoenix Technologies / Needham / Lucent Technologies / / Event FDA Phase / Person Communication and Meetings / / Facility University of Luxembourg Abstract / Stanford University / Square Computational DiffieHellman / / IndustryTerm secure protocols / on-line dictionary attacks / on-line banking / above protocol / exhaustive search / On-line dictionary attack resistance / exhaustive search attacks / on-line attack / above protocols / different protocol / / Organization University of Luxembourg Abstract / UK Faculty of Science / Stanford University / / Person Bob / Alice / / Position author / Forward / / Product PAKE solution / / SportsLeague Stanford University / / Technology different protocol / J-PAKE protocol / Public Key Infrastructure / above protocol / PKI / augmented PAKE protocol / SSL / encryption / 3 J-PAKE Protocol / cryptography / SPEKE protocols / balanced PAKE protocol / EKE protocol / PAKE protocol / Goldreich-Lindell protocol / P. Ryan The two-round J-PAKE protocol / basic DH protocol / existing PAKE protocols / above protocols / basic DiffieHellman protocol / /
SocialTag |