Encrypted key exchange

Known as: Eke 
Encrypted Key Exchange (also known as EKE) is a family of password-authenticated key agreement methods described by Steven M. Bellovin and Michael… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
Password-based encrypted key exchange are protocols that are designed to provide pair of users communicating over an unreliable… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
“Grid” technology enables complex interactions among computational and data resources; however, to be deployed in production… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Schemes for encrypted key exchange are designed to provide two entities communicating over a public network, and sharing a (short… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Three-party key-exchange protocols with password authentication-clients share an easy-to-remember password with a trusted server… (More)
  • table I
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password-based mechanism is the widely used method for authentication since it allows people to choose their own passwords… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A new simple password exponential key exchange method (SPEKE) is described. It belongs to an exclusive class of methods which… (More)
  • table 4
  • figure 4.3
  • table 4.6
Is this relevant?
Highly Cited
1995
Highly Cited
1995
In their recent paper, "Encrypted Key Exchange: Password-based Protocols Secure Against Dictionary Attacks," Bellovin and Merritt… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1993
Highly Cited
1993
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries… (More)
  • table 1
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a… (More)
Is this relevant?