Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Secure Remote Password protocol

Known as: SRP, SRP protocol, Secure Remote Password 
The Secure Remote Password protocol (SRP) is an augmented password-authenticated key agreement (PAKE) protocol, specifically designed to work around… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Thanks to John Ramsdell (MITRE) and other participants at the Protocol eXchange for fruitful interactions. This research was… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2014
2014
Business process modelling and security engineering are two important concerns when developing information system. However… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2011
2011
Pavlov, a well-known strategy in game theory, has been shown to have some advantages in the Iterated Prisoner's Dilemma (IPD… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2004
2004
The Secure Remote Password (SRP) protocol is an authentication and key-exchange protocol suitable for secure password… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • figure 3
2003
2003
SRP (the secure remote password protocol) is a new secure password authentication and key-exchange protocol. By using verifier… Expand
2002
2002
The paper evaluates the performances of the Secure Remote Password (SRP) authentication protocol computations. The software… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 5
  • figure 6
Highly Cited
2001
Highly Cited
2001
  • P. MacKenzie
  • IACR Cryptol. ePrint Arch.
  • 2001
  • Corpus ID: 13979610
In the most strict formal deenition of security for password-authenticated key exchange, an adversary can test at most one… Expand
Highly Cited
1999
Highly Cited
1999
Kerberos is a distributed authentication system that many organizations use to handle domain-wide password security. Although it… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Highly Cited
1999
Highly Cited
1999
Many authentication schemes depend on secret passwords. Unfortunately, the length and randomness of user-chosen passwords remain… Expand
  • figure I
Highly Cited
1998
Highly Cited
1998
This paper presents a new password authentication and key-exchange protocol suitable for authenticating users and exchanging keys… Expand
  • table 2
  • table 3
  • table 4
  • table 5
  • table 6