메뉴 건너뛰기




Volumn 3802 LNAI, Issue , 2005, Pages 356-363

On the security of the Canetti-Krawczyk model

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEM ANALYSIS; INFORMATION ANALYSIS; MATHEMATICAL MODELS; NETWORK PROTOCOLS;

EID: 33646831640     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11596981_53     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 35048860626 scopus 로고    scopus 로고
    • Advances in cryptology eurocrypt 2001, analysis of keyexchange protocols and their use for building secure channels
    • Springer-Verlag
    • Canetti, R., Krawczyk, H., Advances in Cryptology Eurocrypt 2001, Analysis of KeyExchange Protocols and Their Use for Building Secure Channels. Lecture Notes in Computer Science, Springer-Verlag,Vol 2045 (2001) 453-474.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 2
    • 35048899816 scopus 로고    scopus 로고
    • Key agreement using statically keyed authenticators
    • Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Springer-verlag
    • Colin Boyd, Wenbo Mao and Kenny Paterson: Key Agreement using Statically Keyed Authenticators, Applied Cryptography and Network Security: Second International Conference, ACNS 2004, Lecture Notes in Computer Science, Springer-verlag, volume 3089,(2004)248-262.
    • (2004) Lecture Notes in Computer Science , vol.3089 , pp. 248-262
    • Boyd, C.1    Mao, W.2    Paterson, K.3
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distributionAdvances in Cryptology,- CRYPTO'93
    • Springer-Verlag
    • Bellare, M., Rogaway, P., Entity authentication and key distribution, Advances in Cryptology,- CRYPTO'93, Lecture Notes in Computer Science, Springer-Verlag, Vol 773 (1994) 232-249
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key-exchange protocols
    • Bellare, M., Canetti, R., Krawczyk, H., A modular approach to the design and analysis of authentication and key-exchange protocols, 30th STOC, (1998)419-428
    • (1998) 30th STOC , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie, M. Hellman: New directions in cryptography, IEEE Trans. Info. Theory IT-22, November (1976)644-654
    • (1976) IEEE Trans. Info. Theory , vol.IT-22 , Issue.NOVEMBER , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 10
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • V. Shoup, On Formal Models for Secure Key Exchange, Theory of Cryptography Library, 1999. http://philby.ucsd,edu/cryptolib/1999/99-12.html
    • (1999) Theory of Cryptography Library
    • Shoup, V.1
  • 12
    • 0005243827 scopus 로고    scopus 로고
    • An efficient protocol for authenticated key agreement
    • Department of C&O, University of Waterloo
    • L. law, A. Menezes, M.Qu, et.al, An Efficient Protocol for Authenticated Key Agreement. Tech. Bep. CORR 98-05, Department of C&O, University of Waterloo.
    • Tech. Rep. , vol.CORR 98-05
    • Law, L.1    Menezes, A.2    Qu, M.3
  • 13
    • 33644496615 scopus 로고    scopus 로고
    • Cryptanalysis of Al-Riyami-Paterson's authenticated three party key agreement protocols
    • Report 2003/122
    • K. Shim, Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols, Cryptology ePrint Archive, Report 2003/122, 2003. http://eprint.iacr.org/2003/122.
    • (2003) Cryptology EPrint Archive
    • Shim, K.1
  • 14
    • 84858809967 scopus 로고    scopus 로고
    • Security analysis of IKE's signature-based key-exchange protocol
    • R. Canetti, H. Krawczyk, Security Analysis of IKE's Signature-based Key-Exchange Protocol, Proc. of the Crypto conference, (2002).
    • (2002) Proc. of the Crypto Conference
    • Canetti, R.1    Krawczyk, H.2
  • 15
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • Günther Horn, Keith M. Martin, Chris J. Mitchell, Authentication Protocols for Mobile Network Environment Value-Added Services, IEEE Transaction on Vehicular Technology, Vol 51 (2002)383-392
    • (2002) IEEE Transaction on Vehicular Technology , vol.51 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 18
    • 84947232363 scopus 로고    scopus 로고
    • Universally composable notions of key exchange and secure channels
    • Advances in Cryptology-EUROCRYPT 2002, Springer-vertag
    • R. Canetti, H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Advances in Cryptology-EUROCRYPT 2002, Lecture Notes in Computer Science, Springer-vertag, volume 2332 (2002) 337-351.
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 20
    • 0001566477 scopus 로고    scopus 로고
    • Formal verification of cryptographic protocols: A survey
    • Advances in Cryptology, Asiacrypt'96 Proceedings. Springer-Verlag
    • Meadows C. Formal verification of cryptographic protocols: A survey. In: Advances in Cryptology, Asiacrypt'96 Proceedings. Lecture Notes in Computer Science, Springer-Verlag, Vol 1163, (1996) 135-150.
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 135-150
    • Meadows, C.1
  • 21
    • 33646832790 scopus 로고    scopus 로고
    • Security extension for the Canetti-Krawczyk model in identity-based systems
    • Li Xinghua, Ma Jianfeng, SangJae Moon, Security Extension for the Canetti-Krawczyk Model in Identity-based Systems, Science in China, Vol 34, (2004)
    • (2004) Science in China , vol.34
    • Li, X.1    Ma, J.2    Moon, S.3
  • 22
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • the 7th International Workshop on Theory and Practice in Public Key Cryptography-PKC 2004, Springer-Verlag, (2947)
    • E. Bresson, O. Chevassut, D. Pointcheval. New Security Results on Encrypted Key Exchange, the 7th International Workshop on Theory and Practice in Public Key Cryptography-PKC 2004, Springer-Verlag, LNCS (2947) 145-158.
    • LNCS , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.