메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 309-326

Secure communications over insecure channels based on short authenticated strings

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; MOBILE COMPUTING; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; TELECOMMUNICATION SYSTEMS;

EID: 33745156127     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (117)

References (40)
  • 1
    • 33645492588 scopus 로고    scopus 로고
    • publication #186-2. U.S. Department of Commerce, National Institute of Standards and Technology
    • Digital Signature Standard (DSS). Federal Information Processing Standards publication #186-2. U.S. Department of Commerce, National Institute of Standards and Technology, 2000.
    • (2000) Federal Information Processing Standards
  • 3
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Les Diablerets, Switzerland, Lecture Notes in Computer Science 3386, Springer-Verlag
    • M. Abdalla, P.-A. Fouque, D. Pointcheval. Password-Based Authenticated Key Exchange in the Three-Party Setting. In Public Key Cryptography'05, Les Diablerets, Switzerland, Lecture Notes in Computer Science 3386, pp. 65-84, Springer-Verlag, 2005.
    • (2005) Public Key Cryptography'05 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Brugge, Belgium, Lecture Notes in Computer Science 1807, Springer-Verlag
    • M. Bellare, D. Pointcheval, P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In Advances in Cryptology EUROCRYPT'00, Brugge, Belgium, Lecture Notes in Computer Science 1807, pp. 139-155, Springer-Verlag, 2000.
    • (2000) Advances in Cryptology EUROCRYPT'00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 773, Springer-Verlag
    • M. Bellare, P. Rogaway. Entity Authentication and Key Distribution. In Advances in Cryptology CRYPTO'93, Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 773, pp. 232-249, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology CRYPTO'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • Las Vegas, Nevada, U.S.A., ACM Press
    • M. Bellare, P. Rogaway. Provably Secure Session Key Distribution: the Three Party Case. In Proceedings of the 27th ACM Symposium on Theory of Computing, Las Vegas, Nevada, U.S.A., pp. 57-66, ACM Press, 1995.
    • (1995) Proceedings of the 27th ACM Symposium on Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • Oakland, California, USA, pp. IEEE Computer Society Press
    • S. M. Bellovin, M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks. In IEEE symposium on Research in Security and Privacy, Oakland, California, USA, pp. IEEE Computer Society Press, 72-84, 1992.
    • (1992) IEEE Symposium on Research in Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 11
    • 84947778144 scopus 로고    scopus 로고
    • The decision diffie-hellman problem
    • Portland, Oregon, U.S.A., Lecture Notes in Computer Science 1423, Springer-Verlag
    • D. Boneh. The Decision Diffie-Hellman Problem. In Proceedings of the 3rd Algorithmic Number Theory Symposium, Portland, Oregon, U.S.A., Lecture Notes in Computer Science 1423, pp. 48-63, Springer-Verlag, 1998.
    • (1998) Proceedings of the 3rd Algorithmic Number Theory Symposium , pp. 48-63
    • Boneh, D.1
  • 16
    • 84945133720 scopus 로고    scopus 로고
    • Efficient and non-interactive nonmalleable commitments
    • Innsbruck, Austria, Lecture Notes in Computer Science 2045, Springer-Verlag
    • G. Di Crescenzo, J. Katz, R. Ostrovsky, A. Smith. Efficient and Non-Interactive NonMalleable Commitments. In Advances in Cryptology EUROCRYPT'01, Innsbruck, Austria, Lecture Notes in Computer Science 2045, pp. 40-59, Springer-Verlag, 2001.
    • (2001) Advances in Cryptology EUROCRYPT'01 , pp. 40-59
    • Di Crescenzo, G.1    Katz, J.2    Ostrovsky, R.3    Smith, A.4
  • 17
    • 0038784597 scopus 로고    scopus 로고
    • Non-interactive and reusable non-malleable commitment schemes
    • San Diego, California, U.S.A., ACM Press
    • I. Damgård, J. Groth. Non-interactive and Reusable Non-malleable Commitment Schemes. In Proceedings of the 35th ACM Symposium on Theory of Computing, San Diego, California, U.S.A., pp. 426-437, ACM Press, 2003.
    • (2003) Proceedings of the 35th ACM Symposium on Theory of Computing , pp. 426-437
    • Damgård, I.1    Groth, J.2
  • 19
    • 0003286492 scopus 로고    scopus 로고
    • The TLS protocol version 1.0
    • standard tracks, the Internet Society
    • T. Dierks, C. Allen. The TLS Protocol Version 1.0. RFC 2246, standard tracks, the Internet Society, 1999.
    • (1999) RFC , vol.2246
    • Dierks, T.1    Allen, C.2
  • 21
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • C. Gehrmann, C. Mitchell, K. Nyberg. Manual Authentication for Wireless Devices. RSA Cryptobytes, vol. 7, pp. 29-37, 2004.
    • (2004) RSA Cryptobytes , vol.7 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 22
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • C. Mitchell (Ed.), IEE
    • C. Gehrmann, K. Nyberg. Security in Personal Area Networks. In Security for Mobility, C. Mitchell (Ed.), pp. 191-230, IEE, 2004.
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 23
    • 0003224934 scopus 로고
    • The S/KEY one-time password system
    • N. Haller. The S/KEY One-Time Password System. RFC 1760, 1995.
    • (1995) RFC , vol.1760
    • Haller, N.1
  • 25
    • 34247333484 scopus 로고    scopus 로고
    • The ephemeral pairing problem
    • Key West, Florida, USA, Lecture Notes in Computer Science 3110, Springer-Verlag
    • J.-H. Hoepman. The Ephemeral Pairing Problem. In Financial Cryptography, Key West, Florida, USA, Lecture Notes in Computer Science 3110, pp. 212-226, Springer-Verlag, 2004.
    • (2004) Financial Cryptography , pp. 212-226
    • Hoepman, J.-H.1
  • 27
    • 0003308762 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and CRL profile
    • Internet Standard, The Internet Society
    • R. Housley, W. Ford, W. Polk, D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Internet Standard. RFC 2459, The Internet Society, 1999.
    • (1999) RFC , vol.2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 28
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in bluetooth
    • San Francisco, California, USA, Lecture Notes in Computer Science 2020, Springer-Verlag
    • M. Jakobsson, S. Wetzel. Security Weaknesses in Bluetooth. In Topics in Cryptology (CT-RSA'01), San Francisco, California, USA, Lecture Notes in Computer Science 2020, pp. 176-191, Springer-Verlag, 2001.
    • (2001) Topics in Cryptology (CT-RSA'01) , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 29
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Innsbruck, Austria, Lecture Notes in Computer Science 2045, Springer-Verlag
    • J. Katz, R. Ostrovsky, M. Yung. Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. In Advances in Cryptology EUROCRYPT'01, Innsbruck, Austria, Lecture Notes in Computer Science 2045, pp. 475-494, Springer-Verlag, 2001.
    • (2001) Advances in Cryptology EUROCRYPT'01 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 30
    • 0003237987 scopus 로고
    • The kerberos network authentication service (V5)
    • Internet standard
    • J. Kohl, C. Neuman. The Kerberos Network Authentication Service (V5). Internet standard. RFC 1510, 1993.
    • (1993) RFC , vol.1510
    • Kohl, J.1    Neuman, C.2
  • 31
    • 35048882590 scopus 로고    scopus 로고
    • On simulation-sound trapdoor commitments
    • Interlaken, Switzerland, Lecture Notes in Computer Science 3027, Springer-Verlag
    • P. MacKenzie, K. Yang. On Simulation-Sound Trapdoor Commitments. In Advances in Cryptology EUROCRYPT'04, Interlaken, Switzerland, Lecture Notes in Computer Science 3027, pp. 382-400, Springer-Verlag, 2004.
    • (2004) Advances in Cryptology EUROCRYPT'04 , pp. 382-400
    • MacKenzie, P.1    Yang, K.2
  • 32
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. C. Merkle. Secure Communications over Insecure Channels. Communications of the ACM, vol. 21, pp. 294-299, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 294-299
    • Merkle, R.C.1
  • 33
    • 0032069870 scopus 로고    scopus 로고
    • On key control in key agreement protocols
    • C. Mitchell, M. Ward, P. Wilson. On Key Control in Key Agreement Protocols. Electronics Letters, vol. 34, pp. 980-981, 1998.
    • (1998) Electronics Letters , vol.34 , pp. 980-981
    • Mitchell, C.1    Ward, M.2    Wilson, P.3
  • 34
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. M. Needham, M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, vol. 21, pp. 993-999, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 35
    • 23944495158 scopus 로고    scopus 로고
    • IKE in ad-hoc IP networking
    • Heidelberg, Germany, Lecture Notes in Computer Science 3313, Springer-Verlag
    • K. Nyberg. IKE in Ad-hoc IP Networking. In Security in Ad-hoc and Sensor Networks, 1st European Workshop (ESAS'04), Heidelberg, Germany, Lecture Notes in Computer Science 3313, pp. 139-151, Springer-Verlag, 2005.
    • (2005) Security in Ad-hoc and Sensor Networks, 1st European Workshop (ESAS'04) , pp. 139-151
    • Nyberg, K.1
  • 37
    • 35248825608 scopus 로고    scopus 로고
    • On deniability in the common reference string and random oracle model
    • Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 2729, Springer-Verlag
    • R. Pass. On Deniability in the Common Reference String and Random Oracle Model. In Advances in Cryptology CRYPTO'03, Santa Barbara, California, U.S.A., Lecture Notes in Computer Science 2729, pp. 316-337, Springer-Verlag, 2003.
    • (2003) Advances in Cryptology CRYPTO'03 , pp. 316-337
    • Pass, R.1
  • 39
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • R. L. Rivest, A. Shamir and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystem. Communications of the ACM, vol. 21, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 40
    • 84947251443 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Cambridge, United Kingdom, Lecture Notes in Computer Science 1796, Springer-Verlag
    • F. Stajano, R. Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Proceedings of the 7th International Workshop on Security Protocols, Cambridge, United Kingdom, Lecture Notes in Computer Science 1796, pp. 172-194, Springer-Verlag, 1999.
    • (1999) Proceedings of the 7th International Workshop on Security Protocols , pp. 172-194
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.