메뉴 건너뛰기




Volumn 3032, Issue , 2004, Pages 924-931

Authenticated key exchange protocol secure against offline dictionary attack and server compromise

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 26444609404     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24679-4_154     Document Type: Article
Times cited : (5)

References (17)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology Eurocrypt'00, Springer-Verlag
    • Bellare, M., Pointcheaval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. Advances in Cryptology Eurocrypt'00, LNCS Vol. 1807. Springer-Verlag (2000) 139-155
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheaval, D.2    Rogaway, P.3
  • 2
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attack
    • Bellovin, S. M., Merrit, M.: Encrypted key exchange: Password-based protocols secure against dictionary attack. In Proceedings of IEEE Security and Privacy (1992) 72-84
    • (1992) Proceedings of IEEE Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merrit, M.2
  • 3
    • 0033280383 scopus 로고    scopus 로고
    • Public key cryptography and password protocols: The multi-user case
    • Boyarsky, M.: Public key cryptography and password protocols: The multi-user case. In ACM Security (CCS'99) (1999) 63-72
    • (1999) ACM Security (CCS'99) , pp. 63-72
    • Boyarsky, M.1
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Probably secure password authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology Eurocrypt'00, Springer-Verlag
    • Boyko, V., MacKenzie, P., Patal, S.: Probably secure password authenticated key exchange using Diffie-Hellman. Advances in Cryptology Eurocrypt'00, LNCS Vol. 1807. Springer-Verlag (2000) 156-171
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patal, S.3
  • 6
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, Vol. IT-31, No. 4. (1985) 469-472
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 7
    • 0003629991 scopus 로고
    • FIPS 180-1: Secure hash standards
    • US Department Commerce/NIST, National Technical Information Service, Springfield, Virginia
    • FIPS 180-1: Secure hash standards. Federal Information Processing Standards Publication 180-1, US Department Commerce/NIST, National Technical Information Service, Springfield, Virginia (1995)
    • (1995) Federal Information Processing Standards Publication 180-1
  • 9
    • 0032218224 scopus 로고    scopus 로고
    • Public key cryptography and password protocols
    • Halevi, S., Krawczyk, H.: Public key cryptography and password protocols. In ACM Security (CCS'98) (1998) 122-131
    • (1998) ACM Security (CCS'98) , pp. 122-131
    • Halevi, S.1    Krawczyk, H.2
  • 10
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • ACM SIGCOMM
    • Jablon, D.: Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM, Vol. 26, No. 5. (1996) 5-20
    • (1996) ACM Computer Communication Review , vol.26 , Issue.5 , pp. 5-20
    • Jablon, D.1
  • 11
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password authenticated key exchange using human memorable passwords
    • Advances in Cryptology Eurocrypt'01, Springer-Verlag
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient password authenticated key exchange using human memorable passwords. Advances in Cryptology Eurocrypt'01, LNCS Vol. 2045. Springer-Verlag (2001) 475-494
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 12
    • 0000112683 scopus 로고
    • Eliptic curve cryptosystems
    • Koblitz, N.: Eliptic curve cryptosystems. Mathematics of Computation, Vol. 48, No. 177. (1987) 203-209
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 16
    • 0030648441 scopus 로고    scopus 로고
    • Number theoretic attacks on secure password schemes
    • Patal, S.: Number theoretic attacks on secure password schemes. In proceedings of IEEE Security and Privacy (1997) 236-247
    • (1997) Proceedings of IEEE Security and Privacy , pp. 236-247
    • Patal, S.1
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R. L., Shamir, A., Adleman, L. M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol. 21, No. 2 (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.