{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T05:18:41Z","timestamp":1740633521474,"version":"3.38.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2010,10,7]],"date-time":"2010-10-07T00:00:00Z","timestamp":1286409600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s10207-010-0120-3","type":"journal-article","created":{"date-parts":[[2010,10,6]],"date-time":"2010-10-06T11:40:53Z","timestamp":1286365253000},"page":"387-410","source":"Crossref","is-referenced-by-count":5,"title":["Password-authenticated key exchange based on RSA"],"prefix":"10.1007","volume":"9","author":[{"given":"Philip","family":"MacKenzie","sequence":"first","affiliation":[]},{"given":"Sarvar","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Swaminathan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,10,7]]},"reference":[{"key":"120_CR1","volume-title":"Algorithmic Number Theory: Volume 1 Efficient Algorithms","author":"E. Bach","year":"1996","unstructured":"Bach E., Shallit J.: Algorithmic Number Theory: Volume 1 Efficient Algorithms. The MIT Press, Cambridge, Massachusetts (1996)"},{"key":"120_CR2","doi-asserted-by":"crossref","unstructured":"Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. In: EUROCRYPT 2000 (LNCS 1807), pp. 139\u2013155 (2000)","DOI":"10.1007\/3-540-45539-6_11"},{"key":"120_CR3","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communication Science (CCS) \u201993, pp. 62\u201373 (1993)","DOI":"10.1145\/168588.168596"},{"key":"120_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: CRYPTO \u201993 (LNCS 773), pp. 232\u2013249 (1993)","DOI":"10.1007\/3-540-48329-2_21"},{"key":"120_CR5","doi-asserted-by":"crossref","unstructured":"Bellare, M., Rogaway, P.: Provably secure session key distribution\u2014the three party case. In: 27th ACM Symposium on the Theory of Computing (STOC), pp. 57\u201366 (1995)","DOI":"10.1145\/225058.225084"},{"key":"120_CR6","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72\u201384 (1992)","DOI":"10.1109\/RISP.1992.213269"},{"key":"120_CR7","doi-asserted-by":"crossref","unstructured":"Bellovin, S.M., Merritt, M.: Augumented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In: ACM Conference on Computer and Communication Science (CCS) \u201993, pp. 244\u2013250 (1993)","DOI":"10.1145\/168588.168618"},{"key":"120_CR8","unstructured":"Bleichenbacher, D.: Personal Communication (1999)"},{"key":"120_CR9","doi-asserted-by":"crossref","unstructured":"Boyko, V., MacKenzie, P., Patel, S.: Provably-secure password authentication and key exchange using Diffie\u2013Hellman. In: EUROCRYPT 2000 (LNCS 1807), pp. 156\u2013171 (2000)","DOI":"10.1007\/3-540-45539-6_12"},{"key":"120_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited. In: 30th ACM Symposium on Theory of Computing (STOC), pp. 209\u2013218 (1998)","DOI":"10.1145\/276698.276741"},{"key":"120_CR11","doi-asserted-by":"crossref","unstructured":"Cramer, R., Shoup, V.: A practical public-key cryptosystem provably secure against adaptive chosen ciphertext attack. In: CRYPTO \u201998 (LNCS 1462), pp. 13\u201325 (1998)","DOI":"10.1007\/BFb0055717"},{"issue":"6","key":"120_CR12","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie W., Hellman M.: New directions in cryptography. IEEE Trans. Info. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Info. Theory"},{"key":"120_CR13","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: CRYPTO \u201986 (LNCS 263), pp. 186\u2013194 (1986)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"120_CR14","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Lindell, Y.: Session-key generation using human passwords only. In: CRYPTO 2001 (LNCS 2139), pp. 408\u2013432 (2001)","DOI":"10.1007\/3-540-44647-8_24"},{"issue":"2","key":"120_CR15","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser S., Micali S., Rivest R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"issue":"5","key":"120_CR16","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L. Gong","year":"1993","unstructured":"Gong L., Lomas T.M.A., Needham R.M., Saltzer J.H.: Protecting poorly chosen secrets from guessing attacks. IEEE J. Select. Areas Commun. 11(5), 648\u2013656 (1993)","journal-title":"IEEE J. Select. Areas Commun."},{"key":"120_CR17","doi-asserted-by":"crossref","unstructured":"Gong, L.: Optimal authentication protocols resistant to password guessing attacks. In: 8th IEEE Computer Security Foundations Workshop, pp. 24\u201329 (1995)","DOI":"10.1109\/CSFW.1995.518549"},{"key":"120_CR18","doi-asserted-by":"crossref","unstructured":"Guillou, L.C., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Eurocrypt \u201988 (LNCS 330), pp. 123\u2013128 (1988)","DOI":"10.1007\/3-540-45961-8_11"},{"key":"120_CR19","doi-asserted-by":"crossref","unstructured":"Halevi, S., Krawczyk, H.: Public-key cryptography and password protocols. In: 5th ACM Conference on Computer and Communications Security (CCS), pp. 122\u2013131 (1998)","DOI":"10.1145\/288090.288118"},{"key":"120_CR20","unstructured":"IEEE P1363 Annex D\/Editorial Contribution 1c: Standard specifications for public-key cryptography (June 1998)"},{"issue":"5","key":"120_CR21","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/242896.242897","volume":"26","author":"D. Jablon","year":"1996","unstructured":"Jablon D.: Strong password-only authenticated key exchange. ACM Comput. Commun. Rev. 26(5), 5\u201320 (1996)","journal-title":"ACM Comput. Commun. Rev."},{"key":"120_CR22","doi-asserted-by":"crossref","unstructured":"Jablon, D.: Extended password key exchange protocols immune to dictionary attack. In: WETICE \u201997 Workshop on Enterprise Security, pp. 248\u2013255 (1997)","DOI":"10.1109\/ENABL.1997.630822"},{"key":"120_CR23","doi-asserted-by":"crossref","unstructured":"Katz, J., Ostrovsky, R., Yung, M.: Practical password-authenticated key exchange provably secure under standard assumptions. In: EUROCRYPT 2001 (LNCS 2045), pp. 475\u2013494 (2001)","DOI":"10.1007\/3-540-44987-6_29"},{"key":"120_CR24","unstructured":"Kravitz, D.W.: Digital signature algorithm. U.S. Patent 5,231,668 (27 July 1993)"},{"key":"120_CR25","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1090\/S0025-5718-1984-0726007-1","volume":"42","author":"H.W. Lenstra","year":"1984","unstructured":"Lenstra H.W.: Divisors in residue classes. Math. Comput. 42, 331\u2013340 (1984)","journal-title":"Math. Comput."},{"issue":"4","key":"120_CR26","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"A.K. Lenstra","year":"2001","unstructured":"Lenstra A.K., Verheul E.R.: Selecting cryptographic key sizes. J. Cryptol. 14(4), 255\u2013293 (2001)","journal-title":"J. Cryptol."},{"key":"120_CR27","doi-asserted-by":"crossref","unstructured":"Lucks, S.: Open key exchange: how to defeat dictionary attacks without encrypting public keys. In: Proceedings of the Workshop on Security Protocols (1997)","DOI":"10.1007\/BFb0028161"},{"key":"120_CR28","doi-asserted-by":"crossref","unstructured":"MacKenzie, P.: The PAK suite: protocols for password-authenticated key exchange. DIMACS Technical Report 2002-46 (2002)","DOI":"10.1007\/3-540-45708-9_25"},{"key":"120_CR29","doi-asserted-by":"crossref","unstructured":"MacKenzie P., Patel S., Swaminathan R.: Password-authenticated key exchange based on RSA. In: ASIACRYPT 2000 (LNCS 1976), pp. 599\u2013613 (2000)","DOI":"10.1007\/3-540-44448-3_46"},{"key":"120_CR30","doi-asserted-by":"crossref","unstructured":"Patel, S.: Number theoretic attacks on secure password schemes. In: IEEE Symposium on Research in Security and Privacy, pp. 236\u2013247 (1997)","DOI":"10.1109\/SECPRI.1997.601340"},{"key":"120_CR31","doi-asserted-by":"crossref","unstructured":"Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: EUROCRYPT \u201996 (LNCS 1070), pp. 387\u2013398 (1996)","DOI":"10.1007\/3-540-68339-9_33"},{"key":"120_CR32","unstructured":"Roe, M., Christianson, B., Wheeler, D.: Secure sessions from weak secrets. Technical report, University of Cambridge and University of Hertfordshire (1998)"},{"key":"120_CR33","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest R., Shamir A., Adleman L.: A method for obtaining digital signature and public key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"120_CR34","unstructured":"Shoup, V.: On formal models for secure key exchange. In: IBM Research Report RZ 3120 (1999)"},{"key":"120_CR35","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/206826.206834","volume":"29","author":"M. Steiner","year":"1995","unstructured":"Steiner M., Tsudik G., Waidner M.: Refinement and extension of encrypted key exchange. ACM Oper. Syst. Rev. 29, 22\u201330 (1995)","journal-title":"ACM Oper. Syst. Rev."},{"key":"120_CR36","unstructured":"Wu, T.: The secure remote password protocol. In: 1998 Internet Society Network and Distributed System Security Symposium (NDSS), pp. 97\u2013111 (1998)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0120-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-010-0120-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0120-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T09:52:17Z","timestamp":1740563537000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-010-0120-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,7]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["120"],"URL":"https:\/\/doi.org\/10.1007\/s10207-010-0120-3","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2010,10,7]]}}}