Password-based cryptography

Known as: PBE, Password-based encryption 
Password-based cryptography generally refers to two distinct classes of methods: * Single-party methods * Multi-party methods
Wikipedia

Topic mentions per year

Topic mentions per year

1978-2017
02419782017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Honey encryption (HE) is a novel password-based encryption scheme which is secure against brute-force attack even if users… (More)
  • figure 1
  • table I
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2016
2016
Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite… (More)
  • figure 5
  • figure 6
  • figure 7
  • figure 8
  • figure 9
Is this relevant?
2016
2016
Cryptographic security is usually defined as some form of guarantee that holds except when a bad event with negligible… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2013
2013
We show by counter-example that the soundness security requirement for witness encryp-<lb>tion given by Garg, Gentry, Sahai and… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2012
2012
This paper develops a theory of multi-instance (mi) security and applies it to provide the first<lb>proof-based support for the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Is this relevant?
2010
2010
In this paper, we present a common password-based encryption process, proposed a new idea, with a new encryption model of SLC… (More)
  • figure 2
  • figure 1
  • figure 3
Is this relevant?
Review
2009
Review
2009
The genesis of this article came in 2006 when the author was reviewing cryptographic implementations used by certain New York… (More)
Is this relevant?
2005
2005
The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Many RFCs, but not all, are Proposed Standards, Draft Standards, or Standards. Since the status of these RFCs may change during… (More)
Is this relevant?