메뉴 건너뛰기




Volumn 3574, Issue , 2005, Pages 429-442

Security requirements for key establishment proof models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 26444442332     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11506157_36     Document Type: Conference Paper
Times cited : (20)

References (15)
  • 1
    • 10844233317 scopus 로고    scopus 로고
    • A cryptographically sound dolev-yao style security proof of the needham-schroeder-lowe public-key protocol
    • Michael Backes. A Cryptographically Sound Dolev-Yao Style Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol. IEEE Journal on Selected Areas in Communications, 22(10):2075-2086, 2004.
    • (2004) IEEE Journal on Selected Areas in Communications , vol.22 , Issue.10 , pp. 2075-2086
    • Backes, M.1
  • 3
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • Jeffrey Vitter, editor, ACM Press
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A Modular Approach to The Design and Analysis of Authentication and Key Exchange Protocols. In Jeffrey Vitter, editor, 30th ACM Symposium on the Theory of Computing - STOC 1998, pages 419-428. ACM Press, 1998.
    • (1998) 30th ACM Symposium on the Theory of Computing - STOC 1998 , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Bart Preneel, editor, Springer-Verlag, Volume 1807/2000 of Lecture Notes in Computer Science
    • Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Bart Preneel, editor, Advances in Cryptology - Eurocrypt 2000, pages 139 - 155. Springer-Verlag, 2000. Volume 1807/2000 of Lecture Notes in Computer Science.
    • (2000) Advances in Cryptology - Eurocrypt 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • Douglas R. Stinson, editor, Springer-Verlag, Volume 773/1993 of Lecture Notes in Computer Science
    • Mihir Bellare and Phillip Rogaway. Entity Authentication and Key Distribution. In Douglas R. Stinson, editor, Advances in Cryptology - Crypto 1993, pages 110-125. Springer-Verlag, 1993. Volume 773/1993 of Lecture Notes in Computer Science.
    • (1993) Advances in Cryptology - Crypto 1993 , pp. 110-125
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • F. Tom Leighton and Allan Borodin, editors, ACM Press
    • Mihir Bellare and Phillip Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In F. Tom Leighton and Allan Borodin, editors, 27th ACM Symposium on the Theory of Computing - STOC 1995, pages 57-66. ACM Press, 1995.
    • (1995) 27th ACM Symposium on the Theory of Computing - STOC 1995 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • (Extended version available). Birgit Pfitzmann, editor, Springer-Verlag, Volume 2045/2001 of Lecture Notes in Computer Science
    • Ran Canetti and Hugo Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels (Extended version available from http://eprint.iacr.org/2001/040/). In Birgit Pfitzmann, editor, Advances in Cryptology - Eurocrypt 2001, pages 453-474. Springer-Verlag, 2001. Volume 2045/2001 of Lecture Notes in Computer Science.
    • (2001) Advances in Cryptology - Eurocrypt 2001 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 26444548230 scopus 로고    scopus 로고
    • On session identifiers in provably secure protocols: The bellare-rogaway three-party key distribution protocol revisited
    • (Extended version available). Blundo Carlo and Stelvio Cimato, editors, Springer-Verlag, Volume 3352/2005 of Lecture Notes in Computer Science
    • Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, and Greg Maitland. On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited (Extended version available from http://eprint.iacr.org/2004/345). In Blundo Carlo and Stelvio Cimato, editors, 4th Conference on Security in Communication Networks - SCN 2004, pages 352-367. Springer-Verlag, 2004. Volume 3352/2005 of Lecture Notes in Computer Science.
    • (2004) 4th Conference on Security in Communication Networks - SCN 2004 , pp. 352-367
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3    Maitland, G.4
  • 11
    • 35048878818 scopus 로고    scopus 로고
    • One-round protocols for two-party authenticated key exchange
    • Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Springer-Verlag, Volume 3089/2004 of Lecture Notes in Computer Science
    • Ik Rae Jeong, Jonathan Katz, and Dong Hoon Lee. One-Round Protocols for Two-Party Authenticated Key Exchange. In Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Applied Cryptography and Network Security - ACNS 2004, pages 220-232. Springer-Verlag, 2004. Volume 3089/2004 of Lecture Notes in Computer Science.
    • (2004) Applied Cryptography and Network Security - ACNS 2004 , pp. 220-232
    • Jeong, I.R.1    Katz, J.2    Lee, D.H.3
  • 13
    • 0023247970 scopus 로고
    • Efficient and timely mutual authentication
    • Dave Otway and Owen Rees. Efficient and Timely Mutual Authentication. ACM Operating Systems Review, 21(1):8-10, 1987.
    • (1987) ACM Operating Systems Review , vol.21 , Issue.1 , pp. 8-10
    • Otway, D.1    Rees, O.2
  • 14
    • 84937411969 scopus 로고    scopus 로고
    • Flaws in applying proof methodologies to signature schemes
    • Moti Yung, editor, Springer-Verlag, Volume 2442/2002 of Lecture Notes in Computer Science
    • Jacques Stern, David Pointcheval, John Malone-Lee, and Nigel Smart. Flaws in Applying Proof Methodologies to Signature Schemes. In Moti Yung, editor, Advances in Cryptology - Crypto 2002, pages 93-110. Springer-Verlag, 2002. Volume 2442/2002 of Lecture Notes in Computer Science.
    • (2002) Advances in Cryptology - Crypto 2002 , pp. 93-110
    • Stern, J.1    Pointcheval, D.2    Malone-Lee, J.3    Smart, N.4
  • 15
    • 26444456234 scopus 로고    scopus 로고
    • Provably secure key exchange: An engineering approach
    • Australian Computer Society, Volume 21 of Conferences in Research and Practice in Information Technology
    • Yiu Shing Terry Tin, Colin Boyd, and Juan Manuel Gonzalez-Nieto. Provably Secure Key Exchange: An Engineering Approach. In Australasian Information Security Workshop Conference on ACSW Frontiers 2003, pages 97-104. Australian Computer Society, 2003. Volume 21 of Conferences in Research and Practice in Information Technology.
    • (2003) Australasian Information Security Workshop Conference on ACSW Frontiers 2003 , pp. 97-104
    • Tin, Y.S.T.1    Boyd, C.2    Gonzalez-Nieto, J.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.