scispace - formally typeset
P

Philip D. MacKenzie

Researcher at Alcatel-Lucent

Publications -  22
Citations -  1301

Philip D. MacKenzie is an academic researcher from Alcatel-Lucent. The author has contributed to research in topics: Password & Public-key cryptography. The author has an hindex of 17, co-authored 22 publications receiving 1243 citations. Previous affiliations of Philip D. MacKenzie include Bell Labs.

Papers
More filters
Proceedings ArticleDOI

Networked cryptographic devices resilient to capture

TL;DR: A simple technique by which a device that performs private key operations in networked applications and whose local private key is activated with a password or PIN can be immunized to offline dictionary attacks in case the device is captured is presented.
Book ChapterDOI

Threshold Password-Authenticated Key Exchange

TL;DR: This paper proposes an efficient password-authenticated key exchange system involving a set of servers, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that thresholds does not allow an attacker to perform an offline dictionary attack.
Journal ArticleDOI

Threshold Password-Authenticated Key Exchange

TL;DR: This paper proposes an efficient password-authenticated key exchange system involving a set of servers with known public keys, in which a certain threshold of servers must participate in the authentication of a user, and in which the compromise of any fewer than that threshold of server does not allow an attacker to perform an off-line dictionary attack.
Journal ArticleDOI

Password-authenticated key exchange based on RSA

TL;DR: This paper examines how to design a secure password-authenticated key exchange protocol based on RSA and presents an augmented protocol that is resilient to server compromise, meaning (informally) that an attacker who compromises a server would not be able to impersonate a client, at least not without running an offline dictionary attack against that client’s password.
Book ChapterDOI

Password-Authenticated Key Exchange Based on RSA

TL;DR: It is shown how to modify the OKE protocol to obtain a password-authenticated key exchange protocol that can be proven secure (in the random oracle model), and the resulting protocol is very practical; the basic protocol requires about the same amount of computation as the Diffie-Hellman-based protocols or the well-known ssh protocol.