메뉴 건너뛰기




Volumn 3357, Issue , 2004, Pages 267-279

Password based key exchange with mutual authentication

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ENTROPY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 24144432254     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30564-4_19     Document Type: Article
Times cited : (83)

References (19)
  • 1
    • 0031642585 scopus 로고    scopus 로고
    • A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk, A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols, STOC 98:419-428.
    • STOC , vol.98 , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Mihir Bellare, David Pointcheval, Phillip Rogaway:Authenticated Key Exchange Secure against Dictionary Attacks. EUROCRYPT 2000:139-155.
    • EUROCRYPT , vol.2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고    scopus 로고
    • Entity Authentication and Key Distribution
    • Mihir Bellare, Phillip Rogaway:Entity Authentication and Key Distribution. CRYPTO 1993:232-249.
    • CRYPTO , vol.1993 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0026850091 scopus 로고    scopus 로고
    • Encrypted key exchange:password-based protocols secure against dictionary attacks
    • Bellovin, S.M.; Merritt, M., Encrypted key exchange:password-based protocols secure against dictionary attacks, IEEE S&P'92, 72-84.
    • IEEE S&P'92 , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 5
    • 0027741529 scopus 로고    scopus 로고
    • Augmented Encrypted Key Exchange:A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
    • Steven M. Bellovin, Michael Merritt:Augmented Encrypted Key Exchange:A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM CCS'93:244-250.
    • ACM CCS'93 , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Simon Blake-Wilson, Don Johnson, Alfred Menezes:Key Agreement Protocols and Their Security Analysis. IMA Int. Conf. 1997:30-45.
    • (1997) IMA Int. Conf. , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 7
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • Victor Boyko, Philip D. MacKenzie, Sarvar Patel:Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. EUROCRYPT 2000:156-171.
    • (2000) EUROCRYPT , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Ran Canetti and Hugo Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, Eurocrypt 2001:453-474.
    • (2001) Eurocrypt , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 0031619016 scopus 로고    scopus 로고
    • The Random Oracle Methodology, Revisited (Preliminary Version)
    • Ran Canetti, Oded Goldreich, Shai Halevi:The Random Oracle Methodology, Revisited (Preliminary Version). STOC 1998:209-218.
    • (1998) STOC , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 10
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Ronald Cramer, Victor Shoup:A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack. CRYPTO 1998:13-25.
    • (1998) CRYPTO , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 13
    • 35248830706 scopus 로고    scopus 로고
    • A Framework for Password-Based Authenticated Key Exchange
    • Rosario Gennaro, Yehuda Lindell:A Framework for Password-Based Authenticated Key Exchange. EUROCRYPT 2003:524-543.
    • (2003) EUROCRYPT , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 14
    • 84880888233 scopus 로고    scopus 로고
    • Session-Key Generation Using Human Passwords only
    • Oded Goldreich, Yehuda Lindell:Session-Key Generation Using Human Passwords Only. CRYPTO 2001:408-432.
    • (2001) CRYPTO , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 15
    • 0032218224 scopus 로고    scopus 로고
    • Public-Key Cryptography and Password Protocols
    • Shai Halevi, Hugo Krawczyk:Public-Key Cryptography and Password Protocols. ACM CCS'98:122-131.
    • ACM CCS'98 , pp. 122-131
    • Halevi, S.1    Krawczyk, H.2
  • 16
    • 0031354417 scopus 로고    scopus 로고
    • Extended Password Key Exchange Protocols Immune to Dictionary Attacks
    • David P. Jablon, Extended Password Key Exchange Protocols Immune to Dictionary Attacks. WETICE 1997:248-255.
    • (1997) WETICE , pp. 248-255
    • Jablon, D.P.1
  • 17
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Jonathan Katz, Rafail Ostrovsky, Moti Yung:Efficient Password- Authenticated Key Exchange Using Human-Memorable Passwords. EUROCRYPT 2001:475-494.
    • (2001) EUROCRYPT , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 18
    • 0345686108 scopus 로고    scopus 로고
    • How to Defeat Dictionary Attacks Without Encrypting Public Keys
    • Stefan Lucks, Open Key Exchange:How to Defeat Dictionary Attacks Without Encrypting Public Keys. Security Protocols Workshop 1997:79-90.
    • (1997) Security Protocols Workshop , pp. 79-90
    • Lucks, S.1    Exchange, O.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.