메뉴 건너뛰기




Volumn 76, Issue 5, 1988, Pages 594-602

Protocol Failures in Cryptosystems

Author keywords

[No Author keywords available]

Indexed keywords

DATA PROCESSING - SECURITY OF DATA;

EID: 0024014116     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/5.4444     Document Type: Article
Times cited : (56)

References (22)
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms”
    • Feb.
    • D. Chaum, “Untraceable electronic mail, return addresses and digital pseudonyms”, in Comm. of the ACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.
    • (1981) Comm. of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 4
    • 84976740532 scopus 로고
    • Digital signatures with RSA and other public-key cryptosystems”
    • Apr.
    • D. E. Denning, “Digital signatures with RSA and other public-key cryptosystems”, in Comm. of the ACM, vol. 27, pp. 388–392, Apr. 1984.
    • (1984) Comm. of the ACM , vol.27 , pp. 388-392
    • Denning, D.E.1
  • 5
    • 0020720357 scopus 로고
    • On the security of public key protocols”
    • Mar.
    • D. Dolev and A. C. Yao, “On the security of public key protocols”, IEEE Trans. Informat. Theory, vol. IT-29, no. 2, pp. 198–208, Mar. 1983.
    • (1983) IEEE Trans. Informat. Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 6
    • 0008538346 scopus 로고
    • A further weakness in the common modulus protocol for the RSA cryptoalgorithm”
    • July
    • J. M. DeLaurentis, “A further weakness in the common modulus protocol for the RSA cryptoalgorithm”, Cryptologia, vol. 8, no. 3, pp. 253–259, July 1984.
    • (1984) Cryptologia , vol.8 , Issue.3 , pp. 253-259
    • DeLaurentis, J.M.1
  • 8
    • 0020705956 scopus 로고
    • Protocols for data security”
    • Feb.
    • R. A. DeMillo and M.J. Merritt, “Protocols for data security”, Computer, vol. 16, no. 2, pp. 39–50, Feb. 1983.
    • (1983) Computer , vol.16 , Issue.2 , pp. 39-50
    • DeMillo, R.A.1    Merritt, M.J.2
  • 9
    • 85030458019 scopus 로고
    • A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes”
    • Y. Desmedt and A. M. Odylzko, “A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes”, in Advances in Cryptology-Proc. Crypto 85, pp. 516-522, 1985.
    • (1985) Advances in Cryptology-Proc. Crypto 85 , pp. 516-522
    • Desmedt, Y.1    Odylzko, A.M.2
  • 11
    • 85034631664 scopus 로고
    • On using RSA with low exponent in a public key network”
    • J. Hastad, “On using RSA with low exponent in a public key network”, in Advances in Cryptology-Proc. Crypto 85, pp. 403-408, 1985.
    • (1985) Advances in Cryptology-Proc. Crypto 85 , pp. 403-408
    • Hastad, J.1
  • 12
    • 0019565822 scopus 로고
    • Fast implementation of the knapsack cipher”
    • P. S. Henry, “Fast implementation of the knapsack cipher”, B.S.T.J., vol. 60, pp. 767–773, 1981.
    • (1981) B.S.T.J. , vol.60 , pp. 767-773
    • Henry, P.S.1
  • 13
    • 84939323020 scopus 로고
    • High speed hardware implementation of the knapsack cipher”
    • presented at Crypto 81, Aug.
    • P. S. Henry and R. D. Nash, “High speed hardware implementation of the knapsack cipher”, presented at Crypto 81, Aug. 1981.
    • (1981)
    • Henry, P.S.1    Nash, R.D.2
  • 16
    • 0023295108 scopus 로고
    • The interrogator: Protocol security analysis”
    • Feb.
    • J. K. Millen, S. C. Clark, and S. B. Freedman, “The interrogator: Protocol security analysis”, IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 274–288, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 274-288
    • Millen, J.K.1    Clark, S.C.2    Freedman, S.B.3
  • 17
    • 34250244723 scopus 로고
    • Factoring polynomials with integer coefficients”
    • A. K. Lenstra, H. W. Lenstra, and L. Lovasz, “Factoring polynomials with integer coefficients”, Mathematische Annalen, vol. 261, pp. 513–534, 1982.
    • (1982) Mathematische Annalen , vol.261 , pp. 513-534
    • Lenstra, A.K.1    Lenstra, H.W.2    Lovasz, L.3
  • 18
    • 0004256761 scopus 로고    scopus 로고
    • Cryptographic protocols”
    • Georgia Institute of Technology, GIT-ICS-83/06,1983.
    • M. J. Merritt, “Cryptographic protocols”, Ph.D.Thesis, Georgia Institute of Technology, GIT-ICS-83/06,1983.
    • Ph.D.Thesis
    • Merritt, M.J.1
  • 20
    • 84939357844 scopus 로고
    • Telecommunications: Interoperability and security replacements for the use of the data encryption standard in the physical and data link layers of data communications”
    • Proposed Federal Standard 1026, Washington, DC, Draft of June 1
    • Proposed Federal Standard 1026, “Telecommunications: Interoperability and security replacements for the use of the data encryption standard in the physical and data link layers of data communications”, National Communications System, Washington, DC, Draft of June 1, 1981.
    • (1981) National Communications System
  • 21
    • 0343349510 scopus 로고
    • A ‘weak’ privacy protocol using the RSA cryptoalgorithm”
    • C. J. Simmons, “A ‘weak’ privacy protocol using the RSA cryptoalgorithm”, Cryptologia, vol. 7, pp. 180–182, 1983.
    • (1983) Cryptologia , vol.7 , pp. 180-182
    • Simmons, C.J.1
  • 22
    • 0020279298 scopus 로고
    • Forward search as a cryptanalytic tool against a public key privacy channel”
    • G. J. Simmons and D. B. Holdridge, “Forward search as a cryptanalytic tool against a public key privacy channel”, in Proc. 1982 Symp. on Security and Privacy, pp. 117-128, 1982.
    • (1982) Proc. 1982 Symp. on Security and Privacy , pp. 117-128
    • Simmons, G.J.1    Holdridge, D.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.