{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:02Z","timestamp":1746115862432,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_80","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"730-736","source":"Crossref","is-referenced-by-count":0,"title":["On the Use of a Hash Function in a 3-Party Password-Based Authenticated Key Exchange Protocol"],"prefix":"10.1007","author":[{"given":"Youngsook","family":"Lee","sequence":"first","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"80_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/11745853_28","volume-title":"Public Key Cryptography - PKC 2006","author":"M. Abdalla","year":"2006","unstructured":"Abdalla, M., Bresson, E., Chevassut, O., Pointcheval, D.: Password-based group key exchange in a constant number of rounds. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol.\u00a03958, pp. 427\u2013442. Springer, Heidelberg (2006)"},{"key":"80_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-540-30580-4_6","volume-title":"Public Key Cryptography - PKC 2005","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Fouque, P., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 65\u201384. Springer, Heidelberg (2005)"},{"key":"80_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/11507840_31","volume-title":"Financial Cryptography and Data Security","author":"M. Abdalla","year":"2005","unstructured":"Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 341\u2013356. Springer, Heidelberg (2005)"},{"key":"80_CR4","unstructured":"Bellare, M., Rogaway, P.: The AuthA protocol for password-based authenticated key exchange. Contributions to IEEE P1363 (2000)"},{"key":"80_CR5","unstructured":"Bellovin, S., Merritt, M.: Encrypted key exchange: Password-based protocols secure against dictionary attacks. In: 1992 IEEE Symposium on Research in Security and Privacy, pp. 72\u201384 (1992)"},{"key":"80_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-24632-9_11","volume-title":"Public Key Cryptography \u2013 PKC 2004","author":"E. Bresson","year":"2004","unstructured":"Bresson, E., Chevassut, O., Pointcheval, D.: New security results on encrypted key exchange. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol.\u00a02947, pp. 145\u2013158. Springer, Heidelberg (2004)"},{"issue":"4","key":"80_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"C. Lin","year":"2000","unstructured":"Lin, C., Sun, H., Hwang, T.: Three-party encrypted key exchange: Attacks and a solution. ACM SIGOPS Operating Systems Review\u00a034(4), 12\u201320 (2000)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"80_CR8","doi-asserted-by":"crossref","unstructured":"MacKenzie, P.: The PAK suite: Protocols for password-authenticated key exchange. Contributions to IEEE P1363.2 (2002)","DOI":"10.1007\/3-540-45708-9_25"},{"issue":"3","key":"80_CR9","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/LCOMM.2009.081609","volume":"13","author":"J. Nam","year":"2009","unstructured":"Nam, J., Paik, J., Kang, H., Kim, U., Won, D.: An off-line dictionary attack on a simple three-party key exchange protocol. IEEE Communications Letters\u00a013(3), 205\u2013207 (2009)","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"80_CR10","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.ins.2010.09.011","volume":"181","author":"J. Nam","year":"2011","unstructured":"Nam, J., Paik, J., Won, D.: A security weakness in Abdalla et al.\u2019s generic construction of a group key exchange protocol. Information Sciences\u00a0181(1), 234\u2013238 (2011)","journal-title":"Information Sciences"},{"key":"80_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-540-89754-5_14","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"K. Yoneyama","year":"2008","unstructured":"Yoneyama, K.: Efficient and strongly secure password-based server aided key exchange (Extended abstract). In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 172\u2013184. Springer, Heidelberg (2008)"},{"issue":"1","key":"80_CR12","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.ins.2011.07.015","volume":"184","author":"J. Zhao","year":"2012","unstructured":"Zhao, J., Gu, D.: Provably secure three-party password-based authenticated key exchange protocol. Information Sciences\u00a0184(1), 310\u2013323 (2012)","journal-title":"Information Sciences"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T08:38:50Z","timestamp":1746002330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_80","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}