메뉴 건너뛰기




Volumn 2808, Issue , 2003, Pages 61-84

Initiator-resilient universally composable key exchange

Author keywords

Cryptographic protocols; Formal cryptography; Key exchange; Universal composition

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 0142188056     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39650-5_4     Document Type: Conference Paper
Times cited : (16)

References (22)
  • 2
    • 32844458560 scopus 로고    scopus 로고
    • A Universally Composable Cryptographic Library. Cryptology ePrint Archive
    • January
    • Michael Backes, Birgit Pfitzmann, and Michael Waidner. A Universally Composable Cryptographic Library. Cryptology ePrint Archive, Report 2003/015, January 2003. http://eprint.iacr.org/2003/015/.
    • (2003) Report 2003/015
    • Backes, M.1    Pfitzmann, B.2    Waidner, M.3
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • ACM Press, Full version at
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, pages 419–428. ACM Press, 1998. Full version at http://eprint.iacr.org/1998/009.
    • (1998) Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 0035163054 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • IEEE Computer Society, Full version at
    • Ran Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In Proceedings of 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, pages 136–145. IEEE Computer Society, 2001. Full version at http://eprint.iacr.org/2000/067.
    • (2001) Proceedings of 42Nd Annual Symposium on Foundations of Computer Science, FOCS 2001 , pp. 136-145
    • Canetti, R.1
  • 12
    • 85165851976 scopus 로고    scopus 로고
    • Universally Composable Two-Party and Multi-party Secure Computation, July, Full (and revised) version of [11], available at
    • Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, and Amit Sahai. Universally Composable Two-Party and Multi-party Secure Computation, July 2003.Full (and revised) version of [11], available at http://eprint.iacr.org/2002/140.
    • (2003)
    • Canetti, R.1    Lindell, Y.2    Ostrovsky, R.3    Sahai, A.4
  • 15
    • 0020720357 scopus 로고
    • On the Security of Public Key Protocols
    • March
    • Danny Dolev and Andrew C. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198–208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 18
    • 85165864200 scopus 로고    scopus 로고
    • IPSEC Working Group INTERNET-DRAFT draft-ietf-ipsec-ikev2-06.txt, March, Available at
    • Internet Key Exchange (IKEv2) Protocol. Charlie Kaufman, editor. IPSEC Working Group INTERNET-DRAFT draft-ietf-ipsec-ikev2-06.txt, March 2003. Available at http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-06.txt.
    • (2003)
    • Kaufman, C.1
  • 19
    • 0003984462 scopus 로고    scopus 로고
    • Pseudorandomness and Cryptographic Applications
    • Princeton University Press
    • Michael Luby. Pseudorandomness and Cryptographic Applications. Princeton Computer Science Notes. Princeton University Press, 1996.
    • (1996) Princeton Computer Science Notes
    • Luby, M.1
  • 20
    • 0034823388 scopus 로고    scopus 로고
    • A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission
    • IEEE Computer Society Press, Full version at
    • Birgit Pfitzmann and Michael Waidner. A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission. In IEEE Symposium on Research in Security and Privacy, pages 184–200. IEEE Computer Society Press, 2001. Full version at http://eprint.iacr.org/2000/066.
    • (2001) IEEE Symposium on Research in Security and Privacy , pp. 184-200
    • Pfitzmann, B.1    Waidner, M.2
  • 21
    • 85165842976 scopus 로고    scopus 로고
    • On Formal Models for Secure Key Exchange. Cryptology ePrint Archive
    • Victor Shoup. On Formal Models for Secure Key Exchange. Cryptology ePrint Archive, Report 1999/012, 1999. http://eprint.iacr.org/1999/012.
    • (1999) Report 1999/012
    • Shoup, V.1
  • 22
    • 0344996490 scopus 로고    scopus 로고
    • PhD thesis, Universität des Saarlandes, Online available at
    • Michael Steiner. Secure Group Key Agreement. PhD thesis, Universität des Saarlandes, 2002.Online available at http://www.semper.org/sirene/publ/Stei 02.thesis-final.pdf.
    • (2002) Secure Group Key Agreement
    • Steiner, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.