HPAKE : Password Authentication Secure against Cross-Site User Impersonation
From MaRDI portal
Publication:3648469
Recommendations
- OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks
- Fuzzy asymmetric password-authenticated key exchange
- Two-Server Password-Only Authenticated Key Exchange
- Oblivious PAKE: efficient handling of password trials
- User-aware provably secure protocols for browser-based mutual authentication
Cited in
(7)- Provably Secure Scalable Distributed Authentication for Clouds
- Smooth NIZK arguments
- tPAKE: typo-tolerant password-authenticated key exchange
- On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding
- SPP: An anti-phishing single password protocol
- User-aware provably secure protocols for browser-based mutual authentication
- Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
This page was built for publication: HPAKE : Password Authentication Secure against Cross-Site User Impersonation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3648469)