{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:58:16Z","timestamp":1765040296909,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_1","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"1-12","source":"Crossref","is-referenced-by-count":17,"title":["Practical Authenticated Key Agreement Using Passwords"],"prefix":"10.1007","author":[{"given":"Taekyoung","family":"Kwon","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"1_CR2","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution-the three party case. In: ACM Symposium on the Theory of Computing, pp. 232\u2013249 (1993)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/3-540-45539-6_11","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"M. Bellare","year":"2000","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attack. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 139\u2013155. Springer, Heidelberg (2000)"},{"key":"1_CR4","unstructured":"Bellare, M., Rogaway, P.: The AuthA protocol for password-based authenticated key exchange. Submission to the IEEE P1363.2 study group, available from http:\/\/www.cs.ucdavis.edu\/~rogaway\/papers\/autha.ps"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: IEEE Symposium on Research in Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Bellovin, S., Merritt, M.: Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise. In: ACM Conference on Computer and Communications Securit, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/3-540-45539-6_12","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Boyko","year":"2000","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably secure password authenticated key exchange using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 156\u2013171. Springer, Heidelberg (2000)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: Security proofs for an efficient password-based key exchange. In: ACM Conference on Computer Communications Security (2003)","DOI":"10.1145\/948109.948142"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-24632-9_11","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: New security results on Encrypted Key Exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 145\u2013158. Springer, Heidelberg (2004)"},{"issue":"6","key":"1_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W. Diffie","year":"1992","unstructured":"Diffie, W., van Oorschot, P., Wiener, M.: Authentication and authenticated key exchanges. Designs, Codes and Cryptography\u00a02, 107\u2013125 (1992)","journal-title":"Designs, Codes and Cryptography"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/3-540-44647-8_24","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 408\u2013432. Springer, Heidelberg (2001)"},{"key":"1_CR13","unstructured":"IEEE P1363.2, Standard specifications for password-based public key cryptographic techniques, available from http:\/\/grouper.ieee.org\/groups\/1363\/ (December 2002)"},{"key":"1_CR14","unstructured":"ISO\/IEC WD 11770-4, Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets, ISO\/IEC JTC 1\/SC 27 (November 2003)"},{"key":"1_CR15","unstructured":"Phoenix Technologies, Inc., Research Papers on Strong Password Authentication, available from http:\/\/www.integritysciences.com\/links.html (2002)"},{"issue":"5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communications Review\u00a026(5), 5\u201326 (1996)","journal-title":"ACM Computer Communications Review"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Jablon, D.: Extended password key exchange protocols. In: WETICE Workshop on Enterprise Security, pp. 248\u2013255 (1997)","DOI":"10.1109\/ENABL.1997.630822"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-44987-6_29","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Katz","year":"2001","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Efficient password-authenticated key exchange using human-memorable passwords. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 475\u2013494. Springer, Heidelberg (2001)"},{"issue":"10","key":"1_CR19","first-page":"2229","volume":"E85-A","author":"K. Kobara","year":"2002","unstructured":"Kobara, K., Imai, H.: Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model. IEICE Trans.\u00a0E85-A(10), 2229\u20132237 (2002)","journal-title":"IEICE Trans."},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-45146-4_24","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"H. Krawczyk","year":"2003","unstructured":"Krawczyk, H.: SIGMA: The \u2018SINGn-and-MAc\u2019 approach to authenticated Diffie- Hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 400\u2013425. Springer, Heidelberg (2003)"},{"key":"1_CR21","unstructured":"Kwon, T.: Authentication and key agreement via memorable password. In: ISOC Network and Distributed System Security Symposium (February 2001)"},{"key":"1_CR22","unstructured":"Kwon, T.: Practical authenticated key agreement using passwords, Full version of this paper, available from http:\/\/dasan.sejong.ac.kr\/~tkwon\/amp.html"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/BFb0052240","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"C. Lim","year":"1997","unstructured":"Lim, C., Lee, P.: A key recovery attack on discrete log-based schemes using a prime order subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 249\u2013263. Springer, Heidelberg (1997)"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Lomas, M., Gong, L., Saltzer, J., Needham, R.: Reducing risks from poorly chosen keys. In: ACM Symposium on Operating System Principles, pp. 14\u201318 (1989)","DOI":"10.1145\/74850.74853"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-45353-9_27","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"P. MacKenzie","year":"2001","unstructured":"MacKenzie, P.: More efficient password-authenticated key exchange. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 361\u2013377. Springer, Heidelberg (2001)"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"MacKenzie, P.: The PAK suite: Protocols for Password-Authenticated Key Exchange. Submission to IEEE P1363.2 (April 2002)","DOI":"10.1007\/3-540-45708-9_25"},{"key":"1_CR27","first-page":"517","volume-title":"Handbook of applied cryptography","author":"A. Menezes","year":"1997","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography, pp. 517\u2013518. CRC Press, Inc, Boca Raton (1997)"},{"key":"1_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1007\/3-540-68339-9_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"P.C. Oorschot van","year":"1996","unstructured":"van Oorschot, P.C., Wiener, M.: On diffie-hellman key agreement with short exponents. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 332\u2013343. Springer, Heidelberg (1996)"},{"key":"1_CR29","unstructured":"Perlman, R., Kaufman, C.: PDM: A new strong password-based protocol. In: USENIX Security Symposium, pp. 313\u2013321 (2001)"},{"key":"1_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C.-P. Schnorr","year":"1990","unstructured":"Schnorr, C.-P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"},{"key":"1_CR31","unstructured":"Scott, M.: Personal communication (July 2001)"},{"key":"1_CR32","unstructured":"Wu, T.: Secure remote password protocol. In: ISOC Network and Distributed System Security Symposium (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:37:35Z","timestamp":1740523055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}