메뉴 건너뛰기




Volumn 11, Issue 4, 2003, Pages 555-580

Some attacks upon authenticated group key agreement protocols

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTATIONAL COMPLEXITY; FORMAL LOGIC; GROUP TECHNOLOGY; PUBLIC KEY CRYPTOGRAPHY;

EID: 0141528664     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2003-11404     Document Type: Conference Paper
Times cited : (22)

References (23)
  • 1
    • 84879078812 scopus 로고    scopus 로고
    • Reconciling two views of cryptography
    • Proceedings of the IFIP International Conference on Theoretical Computer Science 2000
    • M. Abadi and P. Rogaway, Reconciling two views of cryptography, in: Proceedings of the IFIP International Conference on Theoretical Computer Science 2000, LNCS Vol. 1872, 2000, pp. 3-22.
    • (2000) LNCS , vol.1872 , pp. 3-22
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proceedings of Advances in Cryptology: Crypto'93
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Proceedings of Advances in Cryptology: Crypto'93, LNCS Vol. 773, 1994, pp. 232-249.
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84949230533 scopus 로고    scopus 로고
    • Key agreement protocols and their security analysis
    • Cryptography and Coding
    • S. Blake-Wilson, D. Johnson and A. Menezes. Key agreement protocols and their security analysis, in: Cryptography and Coding, LNCS Vol. 1355, 1997, pp. 30-45.
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 5
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange - The dynamic case
    • Advances in Cryptology - Proceedings of AsiaCrypt 2001, C. Boyd, ed.
    • E. Bresson, O. Chevassut and D. Pointcheval, Provably authenticated group Diffie-Hellman key exchange - the dynamic case, in: Advances in Cryptology - Proceedings of AsiaCrypt 2001, C. Boyd, ed., LNCS Vol. 2248, 2001. pp. 290-309.
    • (2001) LNCS , vol.2248 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 6
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group diffie-hellman key exchange under standard assumptions
    • Advances in Cryptology - Proceedings of Eurocrypt 2002, L. Knudsen, ed.
    • E. Bresson, O. Chevassut and D. Pointcheval, Dynamic group diffie-hellman key exchange under standard assumptions, in: Advances in Cryptology - Proceedings of Eurocrypt 2002, L. Knudsen, ed., LNCS Vol. 2332, 2002, pp. 321-336.
    • (2002) LNCS , vol.2332 , pp. 321-336
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 84904254536 scopus 로고    scopus 로고
    • Communication-efficient group key agreement
    • Kluwer Publishers
    • Y. Kim, A. Perrig and G. Tsudik, Communication-efficient group key agreement, in: Proceedings of IFIP-SEC 2001, Kluwer Publishers, 2001, pp. 229-244.
    • (2001) Proceedings of IFIP-SEC 2001 , pp. 229-244
    • Kim, Y.1    Perrig, A.2    Tsudik, G.3
  • 14
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security 6 (1998), 53-84.
    • (1998) Journal of Computer Security , vol.6 , pp. 53-84
    • Lowe, G.1
  • 16
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: an overview. Journal of Logic Programming 26(2) (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 17
    • 0012795935 scopus 로고    scopus 로고
    • Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
    • C. Meadows. Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives, in: Proceedings of the Workshop on Issues in the Theory of Security, 2000, pp. 1-4.
    • (2000) Proceedings of the Workshop on Issues in the Theory of Security , pp. 1-4
    • Meadows, C.1
  • 20
    • 0031643297 scopus 로고    scopus 로고
    • The inductive approach to verifying cryptographic protocols
    • L.C. Paulson, The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 (1998), 85-128.
    • (1998) Journal of Computer Security , vol.6 , pp. 85-128
    • Paulson, L.C.1
  • 21
    • 0035072287 scopus 로고    scopus 로고
    • Athena, a novel approach to efficient automatic security protocol analysis
    • D. Song, S. Berezin and A. Perrig, Athena, a novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1,2) (2001), 47-74.
    • (2001) Journal of Computer Security , vol.9 , Issue.1-2 , pp. 47-74
    • Song, D.1    Berezin, S.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.