Skip to search formSkip to main contentSkip to account menu

Secure Remote Password protocol

Known as: SRP, SRP protocol, Secure Remote Password 
The Secure Remote Password protocol (SRP) is an augmented password-authenticated key agreement (PAKE) protocol, specifically designed to work around… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was… 
2017
2017
Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete… 
2013
2013
The real-time performance of control network between process control system(PCS) in a nuclear power plant is an important factor… 
Highly Cited
2012
Highly Cited
2012
Systems of bionanomachines may benefit future applications which require interaction with biological systems at the nano- to… 
Highly Cited
2004
Highly Cited
2004
This paper presents the detailed design and performance analysis of MACA-P, a RTS/CTS based MAC protocol, that enables… 
2003
2003
SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol. By using verifier… 
2002
2002
The paper evaluates the performances of the Secure Remote Password (SRP) authentication protocol computations. The software… 
Highly Cited
1999
Highly Cited
1999
  • Thomas D. Wu
  • Network and Distributed System Security Symposium
  • 1999
  • Corpus ID: 462791
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it… 
Highly Cited
1999
Highly Cited
1999
Many authentication schemes depend on secret passwords. Unfortunately, the length and randomness of user-chosen passwords remain… 
Highly Cited
1998
Highly Cited
1998
  • Thomas D. Wu
  • Network and Distributed System Security Symposium
  • 1998
  • Corpus ID: 14281976
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys…