Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Password-based cryptography

Known as: PBE, Password-based encryption 
Password-based cryptography generally refers to two distinct classes of methods: * Single-party methods * Multi-party methods
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Cryptographic security is usually defined as a guarantee that holds except when a bad event with negligible probability occurs… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2018
2018
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at security and privacy… Expand
  • figure 1.1
  • figure 2.2
  • figure 2.3
  • figure 2.6
  • figure 2.7
Is this relevant?
2017
2017
This document provides recommendations for the implementation of password-based cryptography, covering key derivation functions… Expand
Is this relevant?
2017
2017
Voluntary nonfinancial disclosure of product and business expansion plans occurs frequently in practice and is an important… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2016
2016
Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite… Expand
  • figure 5
  • figure 6
  • figure 7
  • figure 8
  • figure 9
Is this relevant?
2016
2016
Programming by example (PBE), or inductive synthesis is a subfield of program synthesis where specification on a target program… Expand
Is this relevant?
2013
2013
We show by counter-example that the soundness security requirement for witness encryption given by Garg, Gentry, Sahai and Waters… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
This paper develops a theory of multi-instance mi security and applies it to provide the first proof-based support for the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This memo represents a republication of PKCS #5 v2.0 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and… Expand
Is this relevant?