메뉴 건너뛰기




Volumn 352, Issue 1-3, 2006, Pages 280-287

Security analysis of a password-based authentication protocol proposed to IEEE 1363

Author keywords

AuthA; Dictionary attacks; EKE; Password based key agreement

Indexed keywords

CRYPTOGRAPHY; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 32644442153     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2005.11.038     Document Type: Article
Times cited : (31)

References (26)
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology - Eurocrypt'2000 Springer, Berlin
    • M. Bellare, D. Pointcheval, P. Rogaway, Authenticated key exchange secure against dictionary attacks, Advances in Cryptology - Eurocrypt' 2000, Lecture Notes in Computer Science, Vol. 1807, Springer, Berlin, 2000, pp. 139-155.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 84944886613 scopus 로고    scopus 로고
    • Ciphers with arbitrary finite domains
    • J. Black, P. Rogaway, Ciphers with arbitrary finite domains, Proc. CT-RSA 2002, pp. 114-130.
    • Proc. CT-RSA 2002 , pp. 114-130
    • Black, J.1    Rogaway, P.2
  • 6
    • 84958760024 scopus 로고    scopus 로고
    • Elliptic curve based password authenticated key exchange protocols
    • ACISP '01 Springer, Berlin
    • C. Boyd, P. Montague, K. Nguyen, Elliptic curve based password authenticated key exchange protocols, in: ACISP '01, Lecture Notes in Computer Science, Vol. 2119, Springer, Berlin, 2001, pp. 487-501.
    • (2001) Lecture Notes in Computer Science , vol.2119 , pp. 487-501
    • Boyd, C.1    Montague, P.2    Nguyen, K.3
  • 7
    • 84937550984 scopus 로고    scopus 로고
    • Provable secure password authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology - Eurocrypt'2000 Springer, Berlin
    • V. Boyko, P. MacKenzie, S. Patel, Provable secure password authenticated key exchange using Diffie-Hellman, Advances in Cryptology - Eurocrypt' 2000, Lecture Notes in Computer Science, Vol. 1807, Springer, Berlin, 2000, pp. 156-171.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 11
  • 12
    • 32644436941 scopus 로고    scopus 로고
    • IEEE P1363.2
    • IEEE P1363.2 〈 http://grouper.ieee.org/groups/1363/passwdPK/ submissions.html 〉
  • 13
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authentication key exchange
    • This is also a submission to IEEE P1363.2
    • D. Jablon Strong password-only authentication key exchange ACM Comput. Communications Rev. 26 5 1996 5 26 This is also a submission to IEEE P1363.2. Available from IEEE P1363.2 〈 http://grouper.ieee.org/groups/1363/passwdPK/ submissions.html 〉
    • (1996) ACM Comput. Communications Rev. , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 14
    • 32644435934 scopus 로고    scopus 로고
    • EC-SRP protocol: Elliptic curve secure remote password protocol
    • Y. Lee, and J.Lee. EC-SRP protocol: elliptic curve secure remote password protocol Korea Inst. Inform. Security Cryptol. 9 1 1999 85 102
    • (1999) Korea Inst. Inform. Security Cryptol. , vol.9 , Issue.1 , pp. 85-102
    • Lee, Y.1    Lee, J.2
  • 15
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • Advances in Cryptology - Crypto'97 Springer, Berlin
    • C. Lim, P. Lee, A key recovery attack on discrete log-based schemes using a prime order subgroup, Advances in Cryptology - Crypto' 97, Lecture Notes in Computer Science, Vol. 1294, Springer, Berlin, 1997, pp. 249-263.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 49-263
    • Lim, C.1    Lee, P.2
  • 16
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Proc. Security Protocols Workshop Springer, Berlin
    • S. Lucks. Open key exchange: how to defeat dictionary attacks without encrypting public keys, Proc. Security Protocols Workshop, Lecture Notes in Computer Science, Vol. 1361, Springer, Berlin, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1361
    • Lucks, S.1
  • 19
    • 0030648441 scopus 로고    scopus 로고
    • Number theoretic attacks on secure password schemes
    • IEEE Press, Silver Spring, MD
    • S. Patel, Number theoretic attacks on secure password schemes, in: Proc. IEEE Symp. on Security and Privacy, IEEE Press, Silver Spring, MD, 1997, pp. 236-247.
    • (1997) Proc. IEEE Symp. on Security and Privacy , pp. 236-247
    • Patel, S.1
  • 20
    • 32644433660 scopus 로고    scopus 로고
    • IETF Working Group
    • SACRED, Securely Available Credentials (sacred), IETF Working Group. More information is available from: 〈 http://www.ietf.org/html.charters/sacred- charter.html 〉
    • SACRED, Securely Available Credentials (Sacred)
  • 23
    • 1842499869 scopus 로고    scopus 로고
    • On Diffie-Hellman key agreement with short exponents
    • Advances in Cryptology - Eurocrypt'96
    • P. van Oorschot, M. Wiener, On Diffie-Hellman key agreement with short exponents, Advances in Cryptology - Eurocrypt' 96, Lecture Notes in Computer Science, Vol. 1070, Springer, Berlin, 1996, pp. 332-343.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 332-343
    • Van Oorschot, P.1    Wiener, M.2
  • 24
    • 32644438545 scopus 로고    scopus 로고
    • Elliptic curve based SRP protocol SRP5
    • Y. Wang. Elliptic curve based SRP protocol SRP5, IEEE P1363.2 standards. http://grouper.ieee.org/groups/1363/passwdPK/contributions.html
    • IEEE P1363.2 Standards
    • Wang, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.