메뉴 건너뛰기




Volumn 13, Issue 3, 2005, Pages 565-591

A computational analysis of the Needham-Schroeder-(Lowe) protocol

Author keywords

Cryptography; Needham Schroeder; Protocol analysis

Indexed keywords

COMPUTATIONAL METHODS; CRYPTOGRAPHY; SECURITY OF DATA;

EID: 24144469346     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2005-13307     Document Type: Conference Paper
Times cited : (8)

References (30)
  • 1
    • 84978977131 scopus 로고    scopus 로고
    • Formal eavesdropping and its computational interpretation
    • Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, N. Kobayashi and B. Pierce, eds, Sendai, Japan, Springer-Verlag
    • M. Abadi and J. Jürgens, Formal eavesdropping and its computational interpretation, in: Proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software, N. Kobayashi and B. Pierce, eds, Volume 2215 of LNCS, Sendai, Japan, Springer-Verlag, 2001, pp. 82-94.
    • (2001) LNCS , vol.2215 , pp. 82-94
    • Abadi, M.1    Jürgens, J.2
  • 2
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), Journal of Cryptology 15(2) (2002), 103-127.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 5
    • 84948957152 scopus 로고    scopus 로고
    • Public-key encryption in a multi-user setting: Security proofs and improvements
    • Number 1807 in LNCS, Springer-Verlag
    • M. Bellare, A. Boldyreva and S. Micali, Public-key encryption in a multi-user setting: Security proofs and improvements, in: Proceedings of Eurocrypt'00, Number 1807 in LNCS, Springer-Verlag, 2000, pp. 259-274.
    • (2000) Proceedings of Eurocrypt'00 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proceedings of CRYPTO '93
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Proceedings of CRYPTO '93, Volume 773 of Lecture Notes in Computer Science, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 84957693225 scopus 로고    scopus 로고
    • A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1
    • Proceedings of CRYPTO'98, Springer-Verlag
    • D. Bleichenbacher, A chosen ciphertext attack against protocols based on the RSA encryption standard PKCS #1, in: Proceedings of CRYPTO'98, Volume 1462 of LNCS, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1462
    • Bleichenbacher, D.1
  • 12
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Transactions on Information Theory 31 (1985), 469-472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 0027306732 scopus 로고
    • A uniform-complexity treatment of encryption and zero-knowledge
    • O. Goldreich, A uniform-complexity treatment of encryption and zero-knowledge, Journal of Cryptology 6(1) (1993), 21-53.
    • (1993) Journal of Cryptology , vol.6 , Issue.1 , pp. 21-53
    • Goldreich, O.1
  • 16
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • G. Lowe, An attack on the Needham-Schroeder public key authentication protocol, Information processing letters 56(3) (1995), 131-136.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 17
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schroeder algorithm
    • Springer-Verlag
    • G. Lowe, Breaking and fixing the Needham-Schroeder algorithm, in: Proceedings of TACAS'96, Springer-Verlag, 1996, pp. 147-166.
    • (1996) Proceedings of TACAS'96 , pp. 147-166
    • Lowe, G.1
  • 18
    • 84883364893 scopus 로고
    • Failures divergence refinement
    • Version 1.3
    • F. S. E. Ltd., Failures divergence refinement - User Manual and Tutorial, 1993, Version 1.3.
    • (1993) User Manual and Tutorial
  • 19
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows, The NRL protocol analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 20
    • 0023985474 scopus 로고
    • The notion of security for probabilistic cryptosystems
    • S. Micali, C. Rackoff and B. Sloan, The notion of security for probabilistic cryptosystems, SIAM Journal of Computing 17(2) (1988), 412-426.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 21
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • Preliminary version in WITS 2002
    • D. Micciancio and B. Warinschi, Completeness theorems for the Abadi-Rogaway logic of encrypted expressions, Journal of Computer Security 12(1) (2004), 99-129. (Preliminary version in WITS 2002.)
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 22
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Theory of Cryptography Conference - Proceedings of TCC 2004, M. Naor, ed., Cambridge, MA, USA, Springer-Verlag
    • D. Micciancio and B. Warinschi, Soundness of formal encryption in the presence of active adversaries, in: Theory of Cryptography Conference - Proceedings of TCC 2004, M. Naor, ed., Volume 2951 of Lecture Notes in Computer Science, Cambridge, MA, USA, Springer-Verlag, 2004, pp. 133-151.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 23
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen cipher text attacks
    • M. Naor and M. Yung, Public-key cryptosystems provably secure against chosen cipher text attacks, in: STOC'90, 1990, pp. 427-437.
    • (1990) STOC'90 , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 25
    • 84974554584 scopus 로고
    • Noninteractive zero-knowledge proofs of knowledge and chosen ciphertext attack
    • C. Rackoff and D. Simon, Noninteractive zero-knowledge proofs of knowledge and chosen ciphertext attack, in: Advances in Cryptology - CRYPTO'91, 1991, pp. 433-444.
    • (1991) Advances in Cryptology - CRYPTO'91 , pp. 433-444
    • Rackoff, C.1    Simon, D.2
  • 27
    • 17144422244 scopus 로고    scopus 로고
    • A proposal for an ISO standard for public key encryption
    • V. Shoup, A proposal for an ISO standard for public key encryption, Cryptology ePrint Archive, Report 2001/112. Available at http://eprint.iacr.org/2001/112.
    • Cryptology EPrint Archive, Report , vol.2001 , Issue.112
    • Shoup, V.1
  • 28
    • 33645607716 scopus 로고    scopus 로고
    • Why chosen ciphertext security matters
    • IBM
    • V. Shoup, Why chosen ciphertext security matters, Technical Report RZ3076, IBM, 1998. http://www.shoup.net.
    • (1998) Technical Report , vol.RZ3076
    • Shoup, V.1
  • 30
    • 84942255620 scopus 로고    scopus 로고
    • A computational analysis of the Needham-Schroeder (-Lowe) protocol
    • ACM Press
    • B. Warinschi, A computational analysis of the Needham-Schroeder (-Lowe) protocol, in: Proceed-ings of 16th Computer Science Foundation Workshop, ACM Press, 2003, pp. 248-262.
    • (2003) Proceed-ings of 16th Computer Science Foundation Workshop , pp. 248-262
    • Warinschi, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.