{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:37:12Z","timestamp":1725493032584},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405153"},{"type":"electronic","value":"9783540450672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-45067-x_39","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T00:29:51Z","timestamp":1193272191000},"page":"452-463","source":"Crossref","is-referenced-by-count":8,"title":["EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange"],"prefix":"10.1007","author":[{"given":"Yong Ho","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Dae Hyun","family":"Yum","sequence":"additional","affiliation":[]},{"given":"Pil Joong","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"key":"39_CR1","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway, Entity authentication and key distribution, Crypto\u201993, pages 232\u2013249, 1993.","DOI":"10.1007\/3-540-48329-2_21"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure Against Dictionary Attacks, Eurocrypt 2000, pages 139\u2013155, 2000.","DOI":"10.1007\/3-540-45539-6_11"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based protocols secure against dictionary attacks, Proceedings of IEEE Security and Privacy, pages 72\u201384, 1992.","DOI":"10.1109\/RISP.1992.213269"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"V. Boyko, P. MacKenzie, and S. Patel, Provably secure password authenticated key exchange using Diffie-Helman, Eurocrypt 2000, pages 156\u2013171, 2000.","DOI":"10.1007\/3-540-45539-6_12"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"D. Denning and G. Sacco, Timestamps in key distribution protocols, Communications of the ACM, vol 24, no 8, pages 533\u2013536, 1981.","journal-title":"Communications of the ACM"},{"issue":"2","key":"39_CR6","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/12.833110","volume":"49","author":"V. S. Dimitrov","year":"2000","unstructured":"V. S. Dimitrov, G. A. Jullien, and W. C. Miller, Complexity and fast algorithms for multi-exponentiations, IEEE Transactions on Computers, vol 49, no 2, pages 141\u2013147, 2000.","journal-title":"IEEE Transactions on Computers"},{"key":"39_CR7","unstructured":"D. Jablon, Extended password key exchange protocols immune to dictionary attack, In WETICE\u201997 Workshop on Enterprise Security, 1997."},{"key":"39_CR8","unstructured":"K. Kobara and H. Imai, Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions, Cryptology ePrint Archive, Report 2003\/038, 2003."},{"key":"39_CR9","unstructured":"T. Kwon, Authentication and key agreement via memorable password, Proceedings of the ISOC NDSS Symposium, 2001."},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"P. MacKenzie, More efficient password-authenticated key exchange, Progress in Cryptology \u2014 CT-RSA 2001, pages 361\u2013377, 2001.","DOI":"10.1007\/3-540-45353-9_27"},{"key":"39_CR11","unstructured":"P. MacKenzie, The PAK suit: Protocols for Password-Authenticated Key Exchange, http:\/\/grouper.ieee.org\/groups\/1363\/passwdPK\/contributions.html#Mac02, April, 2002."},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"B. Moeller, Algorithm for multi-exponentiation, In Selected Areas in Cryptography, SAC 2001, pages 165\u2013180, 2001.","DOI":"10.1007\/3-540-45537-X_13"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"P. van Oorschot and M. Wiener, On Diffie-Hellman key agreement with short exponents, Eurocrypt\u201996, pages 332\u2013343, 1994.","DOI":"10.1007\/3-540-68339-9_29"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"D. G. Park, C. Boyd, and S. J. Moon, Forward Secrecy and Its Application to Futher Mobile Communications Security, Public Key Cryptography, PKC 2000, pages 433\u2013445, 2000.","DOI":"10.1007\/978-3-540-46588-1_29"},{"issue":"1","key":"39_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S. Pohlig","year":"1978","unstructured":"S. Pohlig and M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Transactions on Information Theory, vol 24, no 1, pages 106\u2013110, 1978.","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"J. Pollard, Monte Carlo methods for index computation mod p, Math. of computation, pages 918\u2013924, 1978.","DOI":"10.2307\/2006496"},{"key":"39_CR17","unstructured":"V. Shoup, On formal models for secure key exchange, IBM Research Report RZ 3120, April, 1999."},{"key":"39_CR18","unstructured":"T. Wu, Secure remote password protocol, Proceedings of the ISOC NDSS Symposium, pages 99\u2013111, 1998."},{"issue":"6","key":"39_CR19","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1049\/ip-cdt:19941271","volume":"141","author":"S. M. Yen","year":"1994","unstructured":"S. M. Yen, C. S. Laih, and A. K. Lenstra, Multi-exponentiation (cryptographic protocols), Computers and Digital Techniques, IEEE Proceedings, vol 141, no 6, pages 325\u2013326, 1994.","journal-title":"Computers and Digital Techniques, IEEE Proceedings"},{"key":"39_CR20","unstructured":"IEEE P1363.2: Standard Specifications for Password-Based Public Key Cryptography Techniques, Draft D7, December 20, 2002. http:\/\/grouper.ieee.org\/group\/1363\/."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45067-X_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,4]],"date-time":"2019-05-04T00:05:31Z","timestamp":1556928331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45067-X_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405153","9783540450672"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-45067-x_39","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}