메뉴 건너뛰기




Volumn 25, Issue 2, 2006, Pages 114-120

A new protocol to counter online dictionary attacks

Author keywords

Authentication; Cryptographic protocol; Hash functions; Online dictionary attacks; Passwords

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHIC PROTOCOL; HASH FUNCTIONS; ONLINE DICTIONARY ATTACKS; PASSWORDS;

EID: 33644781729     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2005.09.003     Document Type: Article
Times cited : (22)

References (15)
  • 3
    • 84858562290 scopus 로고    scopus 로고
    • 2004 [accessed on October 08, 2004]
    • (2004)
  • 4
    • 33845269277 scopus 로고    scopus 로고
    • How to re-initialize a hash chain
    • Goyal V. How to re-initialize a hash chain, Cryptology ePrint Archive, Report 2004/097. Available from: eprint.iacr.org ; 2004a.
    • Cryptology EPrint Archive, Report , vol.2004 , Issue.97
    • Goyal, V.1
  • 10
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport Password authentication with insecure communication Communications of the ACM 24 1981 770 772
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 11
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris, and K. Thompson Password security: a case history Communications of the ACM 22 11 November, 1979 594 597
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 13
    • 84858561035 scopus 로고    scopus 로고
    • Terry Ritter Salts Online article at http://www.ciphersbyritter.com/NEWS6/SALT.HTM
    • Salts
    • Terry, R.1
  • 14
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate certificate revocations lists?
    • Financial cryptography, Springer
    • R. Rivest Can we eliminate certificate revocations lists? Financial cryptography LNCS 1998 Springer 178 183
    • (1998) LNCS , pp. 178-183
    • Rivest, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.