{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:37:50Z","timestamp":1758267470995},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540423003"},{"type":"electronic","value":"9783540477198"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47719-5_38","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T05:15:16Z","timestamp":1180761316000},"page":"487-501","source":"Crossref","is-referenced-by-count":32,"title":["Elliptic Curve Based Password Authenticated Key Exchange Protocols"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]},{"given":"Paul","family":"Montague","sequence":"additional","affiliation":[]},{"given":"Khanh","family":"Nguyen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,4]]},"reference":[{"key":"38_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology-Eurocrypt\u20192000","author":"M. Bellare","year":"2000","unstructured":"M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology-Eurocrypt\u20192000, pages 139\u2013155. LNCS vol. 1807, Springer-Verlag, 2000."},{"key":"38_CR2","unstructured":"Mihir Bellare and Phillip Rogaway. The AuthA protocol for password-based authenticated key exchange. In Submission to IEEE P1363 study group, 2000."},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"S. Bellovin and M. Merritt. Encrypted key exchange: Password based protocol secure against dictionary attackes. In Proceedings of the Symposium on Security and Privacy, pages 72\u201384. IEEE, 1992.","DOI":"10.1109\/RISP.1992.213269"},{"key":"38_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology-Eurocrypt\u20192000","author":"V. Boyko","year":"2000","unstructured":"V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange. In Advances in Cryptology-Eurocrypt\u20192000, pages 156\u2013171. LNCS vol. 1807, Springer-Verlag, 2000."},{"issue":"5","key":"38_CR5","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"D. Jablon. Strong password-only authenticated key exchange. ACM Computer Communication Review, 26(5):5\u201320, 1996.","journal-title":"ACM Computer Communication Review"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"S. Patel. Number theoretic attacks on secure password schemes. In Proceedings of the Symposium on Security and Privacy, pages 236\u2013247. IEEE, 1997.","DOI":"10.1109\/SECPRI.1997.601340"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"S. Patel. Information Leakege in Encrypted Key Exchange. In Proceedings of the DIMACS Workshop on Network Threats, 1997.","DOI":"10.1090\/dimacs\/038\/04"},{"key":"38_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology-Crypto 85","author":"V. Miller","year":"1986","unstructured":"V. Miller. Use of elliptic curves in cryptography. In Advances in Cryptology-Crypto 85, pages 417\u2013426. LNCS vol. 218, Springer-Verlag, 1986."},{"key":"38_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.2307\/2007884","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"N. Koblitz. Elliptic curve cryptosystems. Math. Comp., 48:203\u2013209, 1987.","journal-title":"Math. Comp."},{"key":"38_CR10","unstructured":"Wireless Application Protocol-Wireless Transport Layer Security Specification, Wireless Application Forum Ltd, 2000."},{"key":"38_CR11","unstructured":"IEEE P1363 Study Group for Future Public-Key Cryptography Standards. http:\/\/grouper.ieee.org\/groups\/1363\/StudyGroup ."},{"key":"38_CR12","unstructured":"Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard for Financial Services, X9.62, 1998."},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"I.F. Blake, G. Seroussi and N.P. Smart. Elliptic Curves in Cryptography. LMS Lecture Note Series 265, CUP, 1999.","DOI":"10.1017\/CBO9781107360211"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"J.H. Silverman. The Arithmetic of Elliptic Curves. Springer-Verlag, GTM 106, 1986.","DOI":"10.1007\/978-1-4757-1920-8"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47719-5_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:07:05Z","timestamp":1556467625000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47719-5_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423003","9783540477198"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-47719-5_38","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}