P
Philip D. MacKenzie
Researcher at Alcatel-Lucent
Publications - 22
Citations - 1301
Philip D. MacKenzie is an academic researcher from Alcatel-Lucent. The author has contributed to research in topics: Password & Public-key cryptography. The author has an hindex of 17, co-authored 22 publications receiving 1243 citations. Previous affiliations of Philip D. MacKenzie include Bell Labs.
Papers
More filters
Proceedings ArticleDOI
Networked cryptographic devices resilient to capture
TL;DR: A simple technique by which a device that performs private key operations in networked applications and whose local private key is activated with a password or PIN can be immunized to offline dictionary attacks in case the device is captured is presented.
Book ChapterDOI
Threshold Password-Authenticated Key Exchange
TL;DR: This paper proposes an efficient password-authenticated key exchange system involving a set of servers, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that thresholds does not allow an attacker to perform an offline dictionary attack.
Journal ArticleDOI
Threshold Password-Authenticated Key Exchange
TL;DR: This paper proposes an efficient password-authenticated key exchange system involving a set of servers with known public keys, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that threshold of server does not allow an attacker to perform an off-line dictionary attack.
Journal ArticleDOI
Password-authenticated key exchange based on RSA
TL;DR: This paper examines how to design a secure password-authenticated key exchange protocol based on RSA and presents an augmented protocol that is resilient to server compromise, meaning (informally) that an attacker who compromises a server would not be able to impersonate a client, at least not without running an offline dictionary attack against that client’s password.
Book ChapterDOI
Password-Authenticated Key Exchange Based on RSA
TL;DR: It is shown how to modify the OKE protocol to obtain a password-authenticated key exchange protocol that can be proven secure (in the random oracle model), and the resulting protocol is very practical; the basic protocol requires about the same amount of computation as the Diffie-Hellman-based protocols or the well-known ssh protocol.