{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:23Z","timestamp":1725475823336},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673804"},{"type":"electronic","value":"9783540455684"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10719994_12","type":"book-chapter","created":{"date-parts":[[2006,12,30]],"date-time":"2006-12-30T20:38:40Z","timestamp":1167511120000},"page":"147-155","source":"Crossref","is-referenced-by-count":0,"title":["Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client"],"prefix":"10.1007","author":[{"given":"Hyoungkyu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Kiwook","family":"Sohn","sequence":"additional","affiliation":[]},{"given":"Hyoungkyu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Comp. Society Symp. On Research in Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merrit, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conf. Comp. And Comm. Security, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"issue":"5","key":"12_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"20","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM Comput. Commun. Rev.\u00a020(5), 5\u201326 (1996)","journal-title":"ACM Comput. Commun. Rev."},{"key":"12_CR4","unstructured":"Jablon, D.: Extended password key exchange protocols. In: WETICE Workshop on Enterprise Security (1997)"},{"key":"12_CR5","unstructured":"Wu, T.: Secure remote password protocol. In: Internet Society Symp. Network and Distributed System Security (1998)"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1049\/el:19990623","volume":"35","author":"T. Kwon","year":"1999","unstructured":"Kwon, T., Song, J.: Secure agreement scheme for g\n                    xy\n                   via password authentication. Electron. Lett.\u00a035, 892\u2013893 (1999)","journal-title":"Electron. Lett."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Nyberg, K., Rueppel, R.: A new signature scheme based on DSA giving message recovery. In: Nyberg, K., Rueppel, R. (eds.) Proc. 1st ACM Conf. On Comput. Commun. Security, November 1993, pp. 58\u201361 (1993)","DOI":"10.1145\/168588.168595"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/BFb0053746","volume-title":"Parallel Problem Solving from Nature - PPSN V","author":"C. Boyd","year":"1998","unstructured":"Boyd, C., Mathuria, A.: Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. In: Eiben, A.E., B\u00e4ck, T., Schoenauer, M., Schwefel, H.-P. (eds.) PPSN 1998. LNCS, vol.\u00a01498, pp. 344\u2013355. Springer, Heidelberg (1998)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., vanOorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, pp. 388\u2013397. CRC Press, Boca Raton (1996)"},{"issue":"5","key":"12_CR10","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong, L., Lomas, M.A., Needham, R., Saltzer, J.: Protecting poorly chosen secrets from guessing attacks. IEEE Journal on Selected Areas in Communications\u00a011(5), 648\u2013656 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review\u00a029(3), 22\u201330 (1995)","journal-title":"Operating Systems Review"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/BFb0034831","volume-title":"Advances in Cryptology - ASIACRYPT \u201996","author":"R. Anderson","year":"1996","unstructured":"Anderson, R., Vaudenay, S.: Minding your p\u2019s and q\u2019s\u2019. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol.\u00a01163, pp. 15\u201325. Springer, Heidelberg (1996)"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"P.C. Oorschot van","year":"1996","unstructured":"van Oorschot, P.C., Wiener, M.J.: On Diffie-Hellman Key Agreement with Short Exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 332\u2013343. Springer, Heidelberg (1996)"},{"issue":"1","key":"12_CR14","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"-24","author":"S.C. Pohlig","year":"1978","unstructured":"Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory\u00a0IT-24(1), 106\u2013110 (1978)","journal-title":"IEEE Trans. Inform. Theory IT"},{"issue":"8","key":"12_CR15","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D.E. Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Communications of the ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology - ICISC\u201999"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10719994_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T03:42:02Z","timestamp":1552880522000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10719994_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673804","9783540455684"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/10719994_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}