메뉴 건너뛰기




Volumn 135, Issue 1, 2005, Pages 79-94

Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic

Author keywords

Diffie Hellman based key exchange; One time ID; Pre shared key model; SVO Logic

Indexed keywords

CRYPTOGRAPHY; INFORMATION ANALYSIS; INTERNET; RESEARCH; TELECOMMUNICATION SERVICES;

EID: 23144441485     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.06.003     Document Type: Conference Paper
Times cited : (15)

References (13)
  • 1
    • 3042553645 scopus 로고    scopus 로고
    • Analysis of IPSec key exchange standard
    • R. Perlman, C. Kaufman, Analysis of IPSec Key Exchange Standard, WETICE2001, 2001
    • (2001) WETICE2001
    • Perlman, R.1    Kaufman, C.2
  • 2
    • 46749137510 scopus 로고    scopus 로고
    • Notes on dynamic information management for authenticated key exchange
    • March
    • K. Imamoto, K. Sakurai, Notes on Dynamic Information Management for Authenticated Key Exchange, ISEC, March 2003
    • (2003) ISEC
    • Imamoto, K.1    Sakurai, K.2
  • 3
    • 3042617463 scopus 로고    scopus 로고
    • The IKE-SIGMA protocol
    • Nov
    • H. Krawczyk, The IKE-SIGMA Protocol, Internet Draft, Nov 2001. http://www.ee.technion.ac.il/~hugo/draft-krawczyk-ipsec-ike-sigma-00.txt
    • (2001) Internet Draft
    • Krawczyk, H.1
  • 4
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • C. Neuman and T. Ts'o, Kerberos: an authentication service for computer networks, IEEE communications, 1994
    • (1994) IEEE Communications
    • Neuman, C.1    Ts'o, T.2
  • 5
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • D. Otway, and O. Rees Efficient and timely mutual authentication Operating Systems Review 21 1 1987 8 10
    • (1987) Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 6
    • 23144437488 scopus 로고    scopus 로고
    • Provably Secure Three-Party Password-Authenticated Key Exchange
    • C. Lin, H. Wen, T. Hwang, and H. Sun Provably Secure Three-Party Password-Authenticated Key Exchange IEICE TRANS. Fundamentals E85 A 1 2002
    • (2002) IEICE TRANS. Fundamentals , vol.85 , Issue.1
    • Lin, C.1    Wen, H.2    Hwang, T.3    Sun, H.4
  • 7
    • 23144466851 scopus 로고    scopus 로고
    • A unified cryptographic protocol logic
    • P. Syverson and P. C. van Oorschot. A Unified Cryptographic Protocol Logic. NRL CHAOS Report, 5540-227, 1996
    • (1996) NRL CHAOS Report , vol.5540 , Issue.227
    • Syverson, P.1    Van Oorschot, P.C.2
  • 8
    • 84962060059 scopus 로고    scopus 로고
    • The logic of authentication protocols
    • FOSAD'00
    • P. Syverson, and I. Cervesato The Logic of Authentication Protocols FOSAD'00 LNCS 2171 2001 63 137
    • (2001) LNCS , vol.2171 , pp. 63-137
    • Syverson, P.1    Cervesato, I.2
  • 10
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • D. Harkins and D. Carrel. The Internet Key Exchange (IKE), RFC2409, 1998. http://www.ietf.org/rfc/rfc2409.txt
    • (1998) RFC2409
    • Harkins, D.1    Carrel, D.2
  • 11
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • April
    • V. Shoup, On formal models for secure key exchange, IBM Research Report RZ3120, April 1999
    • (1999) IBM Research Report , vol.RZ3120
    • Shoup, V.1
  • 12
    • 3042657129 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • V. Boyko, P. MacKenzie, and S. Patel, Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman, EUROCRYPT'2000, 2000
    • (2000) EUROCRYPT'2000
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.