메뉴 건너뛰기




Volumn 3580, Issue , 2005, Pages 664-676

Password-based encryption analyzed

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; SECURITY OF DATA; THEOREM PROVING;

EID: 26444502046     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11523468_54     Document Type: Conference Paper
Times cited : (24)

References (23)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 84937407719 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Advances in Cryptology - ASIACRYPT 2000, Springer-Verlag
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology - ASIACRYPT 2000, volume 1976 of LNCS, pages 531-545. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 4
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 139-155. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Advances in Cryptology - EUROCRYPT 2000, volume 1807 of LNCS, pages 156-171. Springer-Verlag, 2000.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 7
    • 26444559794 scopus 로고    scopus 로고
    • Analysing password protocol security against off-line dictionary attacks
    • Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands
    • R. Corin, J. M. Doumen, and S. Etalle. Analysing password protocol security against off-line dictionary attacks. Technical report TR-CTIT-03-52, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, 2003.
    • (2003) Technical Report , vol.TR-CTIT-03-52
    • Corin, R.1    Doumen, J.M.2    Etalle, S.3
  • 10
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Advances in Cryptology - EUROCRYPT 2003, Springer-Verlag
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In Advances in Cryptology - EUROCRYPT 2003, volume 2656 of LNCS, pages 524-543. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 11
    • 84880888233 scopus 로고    scopus 로고
    • Session key generation using human passwords only
    • Advances in Cryptology - CRYPTO 2001, Springer-Verlag
    • O. Goldreich and Y. Lindell. Session key generation using human passwords only. In Advances in Cryptology - CRYPTO 2001, volume 2139 of LNCS, pages 403-432. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 403-432
    • Goldreich, O.1    Lindell, Y.2
  • 13
    • 0025545832 scopus 로고
    • Verifiable-text attacks in cryptographic protocols
    • L. Gong. Verifiable-text attacks in cryptographic protocols. In INFOCOM '90, pages 686-693, 1990.
    • (1990) INFOCOM '90 , pp. 686-693
    • Gong, L.1
  • 15
    • 84945132563 scopus 로고    scopus 로고
    • Practical password-authenticated key exchange provably secure under standard assumptions
    • Advances in Cryptology - EUROCRYPT 2001, Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung. Practical password-authenticated key exchange provably secure under standard assumptions. In Advances in Cryptology - EUROCRYPT 2001, volume 2045 of LNCS, pages 475-494. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 17
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. of 2004 IEEE Symposium on Security and Privacy, pages 71-85, 2004.
    • (2004) Proc. of 2004 IEEE Symposium on Security and Privacy , pp. 71-85
    • Laud, P.1
  • 18
    • 0344875574 scopus 로고    scopus 로고
    • Analysing protocols subject to guessing attacks
    • G. Lowe. Analysing protocols subject to guessing attacks. Journal of Computer Security, 12(1):83-98, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 83-98
    • Lowe, G.1
  • 19
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 20
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Theory of Cryptography Conference (TCC 2004), Springer-Verlag
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Theory of Cryptography Conference (TCC 2004), volume 2951 of LNCS, pages 133-151. Springer-Verlag, 2004.
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.