메뉴 건너뛰기




Volumn 2904, Issue , 2003, Pages 375-387

More efficient password authenticated key exchange based on RSA

Author keywords

Key Exchange; Password Authentication; Secure Wireless Communications

Indexed keywords

CRYPTOGRAPHY; LOW POWER ELECTRONICS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0346895367     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24582-7_28     Document Type: Article
Times cited : (17)

References (14)
  • 1
    • 35248816115 scopus 로고    scopus 로고
    • Security analaysis of a password authenticated key exchange protocol
    • Oct
    • Feng Bao. Security analaysis of a password authenticated key exchange protocol, to appear in Information Security (ISC 2003), Oct, 2003.
    • (2003) Information Security (ISC 2003)
    • Bao, F.1
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • Victor Boyko, Philip MacKenzie, and Sarvar Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proc. EUROCRYPT 2000, pages 156-171, 2000.
    • (2000) Proc. EUROCRYPT 2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 6
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Proc. EUROCRYPT 2003. Springer-Verlag, also in Cryptology ePring Archive: Report 2003/032
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In Proc. EUROCRYPT 2003. Springer-Verlag, 2003. Lecture Notes in Computer Science No. 2656, also in Cryptology ePring Archive: Report 2003/032.
    • (2003) Lecture Notes in Computer Science , vol.2656
    • Gennaro, R.1    Lindell, Y.2
  • 9
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • David P. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, ACM, 26(5):5-26, 1996.
    • (1996) Computer Communication Review, ACM , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.P.1
  • 10
    • 0013443819 scopus 로고    scopus 로고
    • Extended password key exchange protocols immune to dictionary attack
    • Cambridge, MA, USA, Jun
    • David P. Jablon. Extended password key exchange protocols immune to dictionary attack. In Proceedings of the WETICE'97 Workshop on Enterprise Security, Cambridge, MA, USA, Jun 1997.
    • (1997) Proceedings of the WETICE'97 Workshop on Enterprise Security
    • Jablon, D.P.1
  • 11
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Proc. EUROCRYPT 2001. Springer-Verlag
    • Jonathan Katz, Rafail Ostrovsky, and Moti Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proc. EUROCRYPT 2001. Springer-Verlag, 2001. Lecture Notes in Computer Science No. 2045.
    • (2001) Lecture Notes in Computer Science , vol.2045
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 12
    • 84957025686 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Proc. of the Security Protocols Workshop
    • Stefan Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proc. of the Security Protocols Workshop, pages 79-90, 1997. LNCS 1361.
    • (1997) LNCS , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 13
    • 84937402236 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • Philip MacKenzie, Sarvar Patel, and Ram Swaminathan. Password-authenticated key exchange based on RSA. In Proc. ASIACRYPT 2000, pages 599-613, 2000.
    • (2000) Proc. ASIACRYPT 2000 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.