메뉴 건너뛰기




Volumn 2727 LNCS, Issue , 2003, Pages 452-463

EPA: An efficient password-based protocol for authenticated key exchange

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC MODELS; AUTHENTICATED KEY EXCHANGES; DICTIONARY ATTACKS; LOW ENTROPIES; SECURITY REQUIREMENTS; AUTHENTICATED KEY EXCHANGE; DICTIONARY ATTACK; LOW ENTROPY;

EID: 26844522740     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45067-X_39     Document Type: Conference Paper
Times cited : (14)

References (20)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway, Entity authentication and key distribution, Crypto'93, pages 232-249, 1993.
    • (1993) Crypto'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Against Dictionary Attacks
    • M. Bellare D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure Against Dictionary Attacks, Eurocrypt 2000, pages 139-155, 2000.
    • (2000) Eurocrypt 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based protocols secure against dictionary attacks
    • S. Bellovin and M. Merritt, Encrypted Key Exchange: Password-based protocols secure against dictionary attacks, Proceedings of IEEE Security and Privacy, pages 72-84, 1992.
    • (1992) Proceedings of IEEE Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merritt, M.2
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using Diffie-Helman
    • V. Boyko, P. MacKenzie, and S. Patel, Provably secure password authenticated key exchange using Diffie-Helman, Eurocrypt 2000, pages 156-171, 2000.
    • (2000) Eurocrypt 2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 5
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning and G. Sacco, Timestamps in key distribution protocols, Communications of the ACM, vol 24, no 8, pages 533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 6
    • 0033879372 scopus 로고    scopus 로고
    • Complexity and fast algorithms for multi-exponentiations
    • V. S. Dimitrov, G. A. Jullien, and W. C. Miller, Complexity and fast algorithms for multi-exponentiations, IEEE Transactions on Computers, vol 49, no 2, pages 141-147, 2000.
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.2 , pp. 141-147
    • Dimitrov, V.S.1    Jullien, G.A.2    Miller, W.C.3
  • 7
    • 0013443819 scopus 로고    scopus 로고
    • Extended password key exchange protocols immune to dictionary attack
    • D. Jablon, Extended password key exchange protocols immune to dictionary attack, In WETICE'97 Workshop on Enterprise Security, 1997.
    • (1997) WETICE'97 Workshop on Enterprise Security
    • Jablon, D.1
  • 8
    • 63449084114 scopus 로고    scopus 로고
    • K. Kobara and H. Imai, Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions, Cryptology ePrint Archive, Report 2003/038, 2003.
    • K. Kobara and H. Imai, Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions, Cryptology ePrint Archive, Report 2003/038, 2003.
  • 9
  • 10
    • 84937579448 scopus 로고    scopus 로고
    • More efficient password-authenticated key exchange
    • P. MacKenzie, More efficient password-authenticated key exchange, Progress in Cryptology - CT-RSA 2001, pages 361-377, 2001.
    • (2001) Progress in Cryptology - CT-RSA 2001 , pp. 361-377
    • MacKenzie, P.1
  • 13
    • 1842499869 scopus 로고
    • On Diffie-Hellman key agreement with short exponents
    • P. van Oorschot and M. Wiener, On Diffie-Hellman key agreement with short exponents, Eurocrypt'96, pages 332-343, 1994.
    • (1994) Eurocrypt'96 , pp. 332-343
    • van Oorschot, P.1    Wiener, M.2
  • 14
    • 84957794888 scopus 로고    scopus 로고
    • Forward Secrecy and Its Application to Futher Mobile Communications Security
    • D. G. Park, C. Boyd, and S. J. Moon, Forward Secrecy and Its Application to Futher Mobile Communications Security, Public Key Cryptography, PKC 2000, pages 433-445, 2000.
    • (2000) Public Key Cryptography, PKC 2000 , pp. 433-445
    • Park, D.G.1    Boyd, C.2    Moon, S.J.3
  • 15
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • S. Pohlig and M. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Transactions on Information Theory, vol 24, no 1, pages 106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 16
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation mod p
    • J. Pollard, Monte Carlo methods for index computation mod p, Math, of computation, pages 918-924, 1978.
    • (1978) Math, of computation , pp. 918-924
    • Pollard, J.1
  • 17
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange,
    • 3120, April
    • V. Shoup, On formal models for secure key exchange, IBM Research Report RZ 3120, April, 1999.
    • (1999) IBM Research Report RZ
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.