Entry Halevi:1999:PKC from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Halevi:1999:PKC,
author = "Shai Halevi and Hugo Krawczyk",
title = "Public-Key Cryptography and Password Protocols",
journal = j-TISSEC,
volume = "2",
number = "3",
pages = "230--268",
month = aug,
year = "1999",
CODEN = "ATISBQ",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Oct 26 11:39:38 MDT 2000",
bibsource = "http://www.acm.org/tissec/contents/v2no3.html;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
URL = "http://www.acm.org/pubs/citations/journals/tissec/1999-2-3/p230-halevi/",
abstract = "We study protocols for strong authentication and key
exchange in asymmetric scenarios where the
authentication server possesses a pair of private and
public keys while the client has only a weak
human-memorizable password as its authentication key.
We present and analyze several simple password
authentication protocols in this scenario, and show
that the security of these protocols can be formally
proven based on standard cryptographic assumptions.
Remarkably, our analysis shows optimal resistance to
off-line password guessing attacks under the choice of
suitable public key encryption functions. In addition
to user authentication, we describe ways to enhance
these protocols to provide two-way authentication,
authenticated key exchange, defense against server's
compromise, and user anonymity. We complement these
results with a proof that strongly indicates that
public key techniques are unavoidable for password
protocols that resist off-line guessing attacks.
\par
As a further contribution, we introduce the notion of
{\em public passwords\/} that enables the use of the
above protocols in situations where the client's
machine does not have the means to validate the
server's public key. Public passwords serve as
``hand-held certificates'' that the user can carry
without the need for special computing devices.",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "dictionary attacks; hand-held certificates; key
exchange; passwords; public passwords; public-key
protocols",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0):
{\bf Security and protection (e.g., firewalls)};
Computing Milieux --- Management of Computing and
Information Systems --- Security and Protection
(K.6.5): {\bf Authentication}",
}
Related entries
- addition,
2(1)3,
2(2)177,
9(2)181,
10(4)1,
10(4)2,
11(3)15,
12(2)11,
12(3)16,
12(3)18,
13(3)27,
13(4)35,
13(4)40,
15(1)4,
17(3)12,
18(3)11
- against,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- analysis,
1(1)66,
2(1)34,
2(2)138,
2(3)332,
4(1)1,
6(4)443,
7(2)175,
7(4)489,
8(3)312,
9(3)292,
9(4)391,
10(1)2,
10(3)9,
10(3)10,
10(3)11,
10(4)2,
10(4)6,
11(2)3,
11(3)13,
11(3)15,
11(4)17,
11(4)18,
11(4)23,
12(1)4,
12(2)10,
12(3)16,
13(1)10,
13(3)25,
13(3)26,
13(3)27,
13(4)41,
14(1)6,
14(1)8,
14(1)13,
14(2)15,
14(4)28,
15(3)14,
15(4)17,
15(4)18,
16(1)2,
16(1)4,
16(2)8,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(1)1,
17(1)4,
17(2)7,
17(3)9,
17(4)14,
18(1)1,
18(1)4,
18(2)6
- analyze,
2(4)416,
9(4)421,
10(1)4,
10(3)9,
10(4)5,
11(2)1,
11(2)3,
11(3)14,
11(3)15,
11(4)23,
12(3)16,
12(3)17,
13(3)27,
15(1)5,
15(2)8,
15(3)11,
16(3)10,
16(4)16,
16(4)17,
18(1)1,
18(1)2,
18(1)3,
18(2)5
- anonymity,
1(1)66,
2(4)354,
2(4)390,
11(2)3,
11(2)6,
12(3)15,
13(2)13,
13(4)29,
13(4)39,
13(4)41,
14(1)4,
14(4)29,
15(1)5,
15(3)11,
15(3)12,
15(3)14,
17(1)4
- assumption,
2(3)332,
3(3)161,
9(2)181,
11(2)3,
11(2)6,
11(4)20,
12(1)1,
12(1)3,
12(2)9,
12(4)21,
13(4)38,
15(1)4,
15(3)12,
16(1)4,
16(2)5,
16(4)13,
18(3)10
- asymmetric,
17(3)9
- authenticated,
6(3)365,
7(2)206,
9(2)181,
10(3)10,
11(2)4,
13(2)17,
13(4)29,
13(4)32,
13(4)33,
14(2)17,
16(4)15,
17(2)7,
17(4)15
- authentication,
1(1)3,
2(2)138,
2(2)159,
2(2)177,
2(3)332,
2(4)354,
2(4)390,
5(4)367,
5(4)458,
6(2)258,
10(3)10,
10(3)11,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(4)21,
13(2)17,
13(4)32,
14(1)5,
14(1)11,
14(4)29,
16(2)6,
16(2)8,
16(4)15,
17(2)6,
17(4)14,
18(1)1,
18(3)11,
18(4)14
- based,
1(1)3,
2(1)34,
2(2)177,
2(3)295,
2(3)332,
3(3)161,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)6,
11(1)3,
11(2)1,
11(2)4,
11(3)12,
11(3)15,
11(4)17,
11(4)18,
12(1)1,
12(1)4,
12(2)13,
12(3)16,
12(3)17,
12(3)18,
13(3)24,
13(3)27,
13(3)28,
13(4)29,
13(4)30,
13(4)31,
13(4)41,
14(1)3,
14(1)4,
14(1)8,
14(1)9,
14(1)10,
14(4)30,
15(2)6,
15(2)7,
15(3)13,
16(2)8,
16(4)16,
17(1)3,
17(2)7,
17(3)12,
17(4)13,
17(4)14,
17(4)15,
17(4)16,
18(1)1,
18(1)4,
18(3)10,
18(3)11,
18(4)14
- C.2.0,
1(1)66,
2(2)159,
2(3)269
- carry,
2(4)416,
10(3)12,
12(2)11
- certificate,
2(2)138,
7(1)21,
10(3)11,
13(3)25,
16(2)5,
16(4)15
- choice,
10(4)5,
11(3)13,
15(3)14,
18(1)1
- client,
2(4)390,
10(2)8,
10(4)4,
11(2)2,
11(3)16,
12(3)14,
12(3)16,
13(4)30,
14(1)12,
14(3)27,
14(4)32,
16(2)5,
16(3)11,
16(3)12,
16(4)13,
17(2)5,
17(4)15
- Communication, Computer-,
2(2)159,
2(3)269,
2(3)332
- complement,
2(4)390,
11(2)5,
13(4)36,
15(4)18,
17(4)14,
18(1)2
- compromise,
2(2)159,
11(4)22,
14(1)7,
14(4)28,
14(4)32,
15(1)5,
15(2)9,
17(2)7,
17(3)11,
18(2)5
- computer,
1(1)66,
2(1)34,
2(1)105,
2(2)159,
2(3)269,
2(3)332,
2(4)354,
2(4)416,
10(2)5,
11(4)20,
12(2)7,
13(2)11,
15(1)1,
15(2)9,
16(2)5,
17(2)6
- Computer-Communication,
2(2)159,
2(3)269,
2(3)332
- computing,
1(1)3,
1(1)66,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(4)354,
2(4)390,
10(4)3,
11(1)3,
11(2)2,
12(1)6,
12(2)8,
12(3)15,
13(3)25,
16(3)11,
18(3)11
- contribution,
1(1)93,
12(3)18,
13(3)27,
14(1)2,
17(3)9,
18(1)4
- cryptographic,
2(4)354,
2(4)390,
2(4)416,
9(2)181,
10(2)6,
10(3)10,
10(4)3,
11(3)12,
12(2)9,
13(1)2,
14(1)10,
14(1)11,
14(1)14,
15(1)3,
15(2)9,
16(1)2,
16(2)6,
17(2)7,
17(3)10,
18(1)3
- cryptography,
2(4)416,
10(3)10,
11(4)17,
14(1)14,
17(2)5
- defense,
11(2)3,
12(2)11,
14(1)7,
14(3)24,
14(3)27,
14(4)31,
15(2)6,
15(4)16,
16(4)13,
17(2)8,
17(3)11
- describe,
1(1)66,
2(1)3,
2(1)34,
2(1)105,
2(2)159,
2(2)177,
2(4)354,
2(4)390,
7(2)319,
10(4)3,
11(4)21,
12(1)1,
12(2)11,
12(3)16,
12(4)21,
13(4)30,
13(4)34,
14(3)24,
14(3)27,
15(3)11,
15(3)13,
16(3)10,
16(3)12,
16(4)14,
17(2)5,
18(2)8
- device,
10(4)3,
10(4)4,
11(2)2,
11(3)14,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
- dictionary,
1(1)3,
9(3)235,
10(4)5,
13(4)35,
14(2)17,
17(4)15,
18(1)1,
18(4)13
- do,
2(3)269,
9(4)421,
10(4)1,
11(1)4,
11(2)2,
11(4)19,
12(1)3,
12(2)10,
13(2)13,
13(4)33,
13(4)35,
14(3)23,
14(3)27,
14(4)28,
16(1)1,
16(3)12,
16(4)13,
17(1)1,
18(3)9
- e.g.,
1(1)66,
2(2)177,
2(4)354,
2(4)390,
10(4)1,
11(4)22,
12(1)1,
12(2)10,
12(2)12,
14(1)2,
15(2)6,
16(2)7,
16(4)14,
17(1)1,
17(3)12,
17(4)15,
18(3)9
- enable,
2(2)177,
2(4)354,
9(4)461,
10(2)5,
11(1)3,
11(4)17,
11(4)23,
12(1)1,
12(1)6,
12(3)14,
13(3)25,
13(4)31,
14(1)3,
14(1)8,
14(4)32,
15(2)7,
16(1)2,
16(2)7,
17(2)5,
17(2)8,
17(3)10,
17(4)16,
18(1)2
- encryption,
2(4)416,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
10(4)4,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)35,
13(4)41,
16(1)2,
16(3)10,
17(2)6,
18(1)4,
18(3)10
- enhance,
9(4)391,
10(1)2,
11(2)2,
12(2)8
- exchange,
9(2)181,
10(3)9,
10(3)10,
11(2)6,
14(4)28,
16(4)15,
17(2)7,
18(1)2
- firewall,
1(1)66,
2(3)269,
15(4)16
- formally,
1(1)26,
9(4)421,
10(3)9,
10(4)2,
11(3)13,
11(4)17,
12(2)8,
13(3)24,
13(3)27,
14(4)30,
17(1)2,
17(1)3
- function,
2(4)390,
9(2)181,
10(2)7,
10(4)3,
11(4)18,
11(4)22,
12(1)1,
12(3)18,
13(1)10,
13(4)33,
16(2)6,
17(4)14,
18(1)1
- further,
2(1)105,
2(4)354,
10(2)8,
10(3)12,
11(1)2,
11(3)15,
11(4)21,
12(2)11,
13(3)25,
13(3)27,
13(4)29,
13(4)30,
14(3)27,
15(2)7,
16(4)16,
16(4)17
- general,
1(1)66,
2(1)65,
2(1)105,
2(2)159,
2(3)269,
9(2)181,
9(4)391,
10(1)2,
10(4)1,
11(1)3,
12(1)2,
12(1)5,
12(3)18,
12(4)20,
13(3)28,
15(1)2,
15(3)13,
16(1)2,
16(1)4,
16(2)7,
17(1)3,
17(1)4,
18(1)3,
18(3)10,
18(4)12
- guessing,
15(3)12
- has,
1(1)93,
2(1)105,
2(2)138,
2(3)269,
2(3)332,
9(4)391,
10(1)3,
10(1)4,
10(3)10,
11(1)2,
11(2)2,
11(3)14,
11(4)17,
11(4)19,
11(4)22,
11(4)23,
12(1)2,
12(2)9,
12(2)10,
12(3)15,
12(4)22,
13(3)20,
13(3)25,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
14(1)3,
14(1)12,
14(1)14,
14(3)26,
14(4)28,
15(1)2,
15(2)6,
15(2)10,
15(3)12,
16(2)8,
16(4)14,
17(1)2,
17(1)3,
17(3)9,
17(3)11,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)14
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- indicate,
10(4)2,
12(1)6,
13(4)35,
16(3)11,
17(2)6,
18(3)9,
18(4)13
- introduce,
1(1)66,
1(1)93,
2(4)390,
9(2)162,
10(1)2,
10(1)3,
10(4)2,
11(2)5,
11(3)12,
11(4)17,
12(1)1,
12(1)3,
12(1)5,
12(2)13,
12(3)14,
12(3)15,
12(4)20,
13(3)24,
13(3)27,
13(4)32,
14(1)3,
14(1)12,
15(1)2,
16(2)7,
16(3)9,
16(3)12,
16(4)17,
17(2)7,
17(3)9
- K.6.5,
1(1)3,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(4)354,
2(4)390
- key, public-,
10(3)11,
11(2)4,
12(1)3
- machine,
2(2)159,
2(2)177,
2(3)295,
12(2)12,
14(1)6,
14(1)10,
14(2)18,
14(2)21,
15(2)9,
15(3)12,
16(2)7,
16(3)9,
16(4)13,
16(4)14,
17(2)8,
18(2)6,
18(3)11
- management,
1(1)3,
2(1)3,
2(1)65,
2(1)105,
2(2)138,
2(2)177,
2(4)354,
2(4)390,
3(2)107,
4(4)321,
4(4)453,
5(2)95,
6(3)327,
9(4)391,
10(4)2,
10(4)4,
11(4)21,
12(1)6,
12(3)18,
13(1)5,
13(4)36,
16(1)4
- mean,
1(1)26,
2(1)34,
10(3)10,
11(2)2,
12(4)22,
14(1)5,
14(3)27,
15(3)12,
16(2)8,
18(4)14
- Milieux,
1(1)3,
1(1)66,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(4)354,
2(4)390
- need,
2(2)177,
2(4)390,
9(4)421,
10(4)2,
10(4)3,
12(3)17,
13(3)22,
15(4)17,
15(4)18,
16(2)6,
17(3)10,
18(2)6,
18(2)7
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(1)1,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- notion,
1(1)66,
2(1)65,
9(2)181,
10(1)3,
10(4)2,
12(1)1,
12(1)6,
12(2)8,
12(4)20,
13(3)24,
13(3)27,
13(4)36,
14(1)4,
14(4)30,
16(1)3,
17(2)7,
18(2)8,
18(3)10
- only,
2(3)295,
10(4)3,
11(1)3,
11(2)4,
11(3)13,
11(4)20,
12(1)2,
12(1)3,
12(2)13,
12(3)19,
12(4)21,
13(1)10,
13(3)25,
13(3)28,
13(4)35,
13(4)37,
13(4)39,
14(1)5,
14(1)11,
14(3)26,
14(4)31,
15(2)9,
15(4)16,
15(4)18,
16(1)3,
16(2)6,
16(2)7,
16(3)9,
16(3)10,
16(4)13,
17(3)9,
17(4)15,
18(2)5,
18(2)8
- optimal,
11(3)12,
11(3)15,
11(4)20,
12(1)6,
13(3)22,
13(3)27
- organization,
1(1)66,
2(1)34,
2(1)65,
2(1)105,
2(2)159,
2(3)269,
2(3)332,
2(4)416,
9(2)113,
9(4)391,
10(4)2,
11(1)3,
12(3)15,
14(3)23,
14(3)25
- pair,
10(4)2,
14(3)27
- password,
1(1)3,
2(4)390,
10(4)5,
11(4)17,
13(4)37,
16(4)15,
17(2)6,
17(4)14,
18(1)1,
18(4)13
- possess,
12(4)20,
14(1)12
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- private,
2(2)177,
2(4)416,
6(4)472,
11(2)6,
12(1)6,
12(2)9,
12(3)16,
12(3)17,
12(3)18,
13(4)37,
14(3)26
- proof,
1(1)93,
2(3)332,
2(4)354,
9(2)181,
10(2)6,
11(3)13,
12(1)3,
12(2)8,
13(3)20,
13(3)25,
14(1)12,
15(1)4,
17(1)4,
17(4)15,
18(1)4,
18(2)8
- protection,
1(1)3,
1(1)26,
1(1)66,
1(1)93,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
2(4)390,
10(1)3,
10(3)9,
11(4)20,
12(2)9,
12(2)11,
13(3)22,
14(3)24,
15(1)2,
15(2)8,
16(2)6
- proven,
14(1)11,
18(3)11
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(2)7,
18(4)13,
18(4)14
- public,
1(1)66,
2(2)138,
4(4)453,
7(1)21,
10(3)10,
11(2)4,
11(3)16,
12(1)3,
12(3)16,
12(3)18,
12(4)22,
16(4)15,
17(2)5,
17(3)10
- public-key,
6(4)547,
10(3)11,
11(2)4,
12(1)3
- remarkably,
17(4)16
- resist,
17(2)6,
18(1)2
- resistance,
10(3)9,
16(1)2
- result,
1(1)3,
1(1)26,
2(4)390,
9(2)162,
10(1)3,
10(1)4,
10(2)5,
10(2)6,
10(3)9,
10(3)11,
10(4)2,
10(4)5,
11(2)3,
11(2)5,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
11(4)21,
11(4)22,
12(1)4,
12(2)9,
12(3)14,
12(3)17,
13(1)10,
13(3)22,
13(3)24,
13(3)25,
13(4)33,
13(4)35,
14(1)2,
14(1)14,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(3)13,
15(3)14,
15(4)15,
16(1)2,
16(1)3,
16(2)5,
16(2)6,
16(2)7,
16(3)10,
16(3)11,
16(4)14,
16(4)17,
17(2)7,
17(3)9,
17(3)10,
17(3)12,
17(4)14,
18(1)4,
18(2)5,
18(2)6,
18(3)9,
18(3)11,
18(4)12,
18(4)13
- scenario,
11(2)6,
11(4)19,
12(1)2,
12(1)4,
12(3)16,
13(3)22,
14(3)25,
15(1)4,
17(3)9,
17(4)16
- serve,
10(4)4,
12(1)2,
15(3)13
- server,
1(1)66,
2(1)34,
2(4)390,
10(4)4,
11(2)2,
11(2)5,
11(3)14,
12(2)10,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
14(1)3,
14(1)12,
14(4)29,
16(4)13,
16(4)15,
17(2)5,
17(4)15,
18(1)1
- several,
1(1)93,
2(1)65,
2(2)138,
2(3)295,
10(1)2,
10(1)4,
10(2)6,
10(2)7,
10(3)12,
10(4)6,
11(1)4,
11(2)4,
11(4)17,
12(2)8,
12(4)20,
13(3)27,
13(4)30,
13(4)39,
13(4)41,
14(3)27,
14(4)29,
14(4)31,
15(2)6,
15(2)10,
16(3)12,
17(1)4,
17(3)9,
17(3)10,
18(1)1
- simple,
5(3)203,
9(2)181,
10(1)4,
10(3)11,
12(2)9,
12(2)13,
12(3)18,
12(4)21,
12(4)22,
13(3)26,
13(4)33,
14(3)27,
15(2)9,
15(4)17,
17(1)2,
18(1)1
- situation,
10(4)4,
11(3)12,
12(4)20,
15(2)10,
17(1)2
- special,
8(4)349,
9(4)421,
10(1)1,
12(1)5,
12(2)7,
13(1)1,
13(2)11,
14(1)1,
14(1)14,
15(1)1,
16(1)4
- standard,
2(4)416,
4(3)224,
7(2)319,
10(2)8,
10(3)11,
10(3)12,
11(1)4,
11(2)4,
12(1)1,
12(3)18,
13(3)28,
13(4)35,
13(4)37,
13(4)41,
15(1)2,
16(1)2,
16(1)3,
16(3)10,
16(4)15,
17(3)11,
17(4)16,
18(4)14
- strong,
2(4)390,
3(3)161,
10(3)11,
11(3)13,
12(4)21,
13(1)7,
13(4)39,
15(1)3,
15(1)4,
16(2)6,
16(3)12,
18(1)1,
18(4)13
- study,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)5,
18(2)7,
18(3)9,
18(4)13
- suitable,
2(4)354,
10(4)5,
11(4)22,
12(1)3,
12(3)15,
15(2)9,
17(3)10
- technique,
1(1)3,
2(2)138,
2(3)295,
2(4)416,
7(2)274,
9(4)391,
9(4)461,
10(2)6,
10(3)9,
10(4)6,
11(2)2,
11(3)12,
11(3)16,
11(4)17,
11(4)18,
11(4)22,
12(1)4,
12(2)11,
12(2)13,
12(3)16,
12(3)18,
13(3)22,
13(3)25,
13(3)28,
13(4)32,
13(4)33,
13(4)35,
13(4)36,
13(4)39,
14(1)3,
14(1)5,
14(1)6,
14(1)13,
14(3)24,
14(4)32,
15(1)2,
15(1)5,
15(2)7,
15(2)8,
15(3)12,
15(4)17,
15(4)18,
16(1)2,
16(2)6,
16(2)7,
16(3)11,
16(4)13,
16(4)14,
17(3)9,
17(3)12,
17(4)16,
18(1)2,
18(2)6,
18(3)11
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)2,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- validate,
12(2)13,
14(4)32,
15(2)6,
15(3)12,
18(2)7
- way,
2(1)3,
2(1)65,
2(3)269,
2(4)416,
9(4)461,
10(4)3,
10(4)4,
11(1)2,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17,
17(2)6
- weak,
1(1)3,
2(4)390,
10(4)5,
15(4)16,
16(4)17,
17(2)7,
18(1)1
- where,
9(4)461,
10(4)4,
10(4)5,
10(4)6,
11(3)12,
11(3)13,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
14(1)7,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
16(2)5,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- while,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
15(4)17,
16(3)9,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1,
18(2)7