메뉴 건너뛰기




Volumn 32, Issue 4, 1998, Pages 33-39

ID-based Secret-Key Cryptography

Author keywords

Authentication protocols; ID based systems; Kerberos; MACs; Onetime passwords; Secret key cryptography

Indexed keywords


EID: 0008482739     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/302350.302359     Document Type: Article
Times cited : (8)

References (21)
  • 1
    • 0003508568 scopus 로고
    • Federal Information Processing Standards Publication, U.S. Department of Commerce, National Bureau of Standards, Springfield (Virginia)
    • FIPS PUB 46. Data encryption standard. Federal Information Processing Standards Publication, U.S. Department of Commerce, National Bureau of Standards, Springfield (Virginia), 1977.
    • (1977) FIPS PUB 46. Data Encryption Standard
  • 7
    • 0025508369 scopus 로고
    • Network security via private-key certificates
    • D. Davis and R. Swick. Network security via private-key certificates. Operating Systems Review, 24:64-67, 1990.
    • (1990) Operating Systems Review , vol.24 , pp. 64-67
    • Davis, D.1    Swick, R.2
  • 8
    • 21344487320 scopus 로고
    • Better login protocols for computer networks
    • B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, Springer-Verlag
    • D. de Waleffe and J.-J. Quisquater. Better login protocols for computer networks. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, pages 50-70. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.741 , pp. 50-70
    • De Waleffe, D.1    Quisquater, J.-J.2
  • 10
    • 0016092372 scopus 로고
    • A user identification scheme not requiring secrecy in the computer
    • August
    • A. Evans Jr, W. Kantrowitz, and E. Weiss. A user identification scheme not requiring secrecy in the computer. Communications of the ACM, 17(8):437-442, August 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.8 , pp. 437-442
    • Evans Jr., A.1    Kantrowitz, W.2    Weiss, E.3
  • 11
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A.M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, Springer-Verlag
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In A.M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer-Verlag, 1987.
    • (1987) Lecture Notes in Computer Science , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 12
    • 0040231044 scopus 로고
    • Foiling the cracker: A survey of, and improvements to password security
    • D. V. Klein. Foiling the cracker: a survey of, and improvements to password security. In Proc. of the 2nd USENIX Security Workshop, pages 5-14, 1990.
    • (1990) Proc. of the 2nd USENIX Security Workshop , pp. 5-14
    • Klein, D.V.1
  • 16
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • August
    • G.P. Purdy. A high security log-in procedure. Communications of the ACM, 17(8):442-445, August 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.8 , pp. 442-445
    • Purdy, G.P.1
  • 17
    • 0003602325 scopus 로고
    • Internet Request for Comments RFC 1321, April
    • R. Rivest. The MD5 message digest algorithm. Internet Request for Comments RFC 1321, April 1992. Available at ftp://ds.internic.net/rfc/rfc1321.txt.
    • (1992) The MD5 Message Digest Algorithm
    • Rivest, R.1
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R.L. Rivest, A. Shamir, and L.M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 20
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G.R. Blakley and D. Chaum, editors, Advances in Cryptology - Proceedings of CRYPTO 84, Springer-Verlag
    • A. Shamir. Identity-based cryptosystems and signature schemes. In G.R. Blakley and D. Chaum, editors, Advances in Cryptology - Proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1985.
    • (1985) Lecture Notes in Computer Science , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.