Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Open key exchange: How to defeat dictionary attacks without encrypting public keys

    Classical cryptographic protocols based on shared secret keys often are vulnerable to key-guessing attacks. For security, the keys must be strong, difficult to memorize for humans. Bellovin and Merritt [4] pro...

    Stefan Lucks in Security Protocols (1998)