메뉴 건너뛰기




Volumn 3876 LNCS, Issue , 2006, Pages 225-244

Perfectly secure password protocols in the bounded retrieval model

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION RETRIEVAL SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA; SERVERS;

EID: 33745629609     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11681878_12     Document Type: Conference Paper
Times cited : (101)

References (27)
  • 1
    • 0004309520 scopus 로고    scopus 로고
    • Research in intrusion-detection systems: A Survey
    • Dept. of Comp. Eng., Chalmers, Univ. of Technology, Goteborg, Sweden
    • S. Axelsson. Research in Intrusion-Detection systems: A Survey, in Technical Report 98-17, Dept. of Comp. Eng., Chalmers, Univ. of Technology, Goteborg, Sweden, 1998, http://citeseer.ist.psu.edu/axelsson98research.html.
    • (1998) Technical Report , vol.98 , Issue.17
    • Axelsson, S.1
  • 6
    • 84945116168 scopus 로고    scopus 로고
    • On perfect and adaptive security in exposureresilient cryptography
    • vol. 2045 of LNCS, Springer-Verlag
    • Y. Dodis, A. Sahai, A. Smith. On Perfect and Adaptive Security in ExposureResilient Cryptography. In Proc. of EUROCRYPT 2001, vol. 2045 of LNCS, pp. 301-324. Springer-Verlag.
    • Proc. of EUROCRYPT 2001 , pp. 301-324
    • Dodis, Y.1    Sahai, A.2    Smith, A.3
  • 7
    • 33745597565 scopus 로고    scopus 로고
    • Password protocols provably secure in the bounded retrieval model
    • unpublished draft, April
    • Password Protocols provably secure in the Bounded Retrieval Model, first public version of this work, unpublished draft, April 2005.
    • (2005) First Public Version of This Work
  • 8
    • 0003532271 scopus 로고    scopus 로고
    • UNIX password security - Ten years later
    • LNCS, no. 435, Springer-Verlag
    • D.C. Feldmeier and P.R. Karn. UNIX Password Security - Ten Years Later, in Proceedings of Crypto'89, LNCS, no. 435, Springer-Verlag, pp. 44-63
    • Proceedings of Crypto'89 , pp. 44-63
    • Feldmeier, D.C.1    Karn, P.R.2
  • 10
    • 33745581489 scopus 로고    scopus 로고
    • Authenticating secure tokens using slow memory access
    • USENIX Press
    • John Kelsey and Bruce Schneier. Authenticating Secure Tokens Using Slow Memory Access. USENIX Workshop on Smart Card Technology, USENIX Press, pp. 101-106, 1999.
    • (1999) USENIX Workshop on Smart Card Technology , pp. 101-106
    • Kelsey, J.1    Schneier, B.2
  • 11
    • 4344636292 scopus 로고    scopus 로고
    • Encryption against storage-bounded adversaries from on-line strong extractors
    • Chi-Jen Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, vol. 17, no. 1, pp. 27-42, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 27-42
    • Lu, C.-J.1
  • 12
    • 4344699394 scopus 로고    scopus 로고
    • Optimal randomizer efficiency in the bounded-storage model
    • Stefan Dziembowski and Ueli Maurer. Optimal Randomizer Efficiency in the Bounded-Storage Model, In Journal of Cryptology, vol. 17, no. 1, pp. 5-26.
    • Journal of Cryptology , vol.17 , Issue.1 , pp. 5-26
    • Dziembowski, S.1    Maurer, U.2
  • 13
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Ueli Maurer. Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. Journal of Cryptology, vol. 5, no. 1, pp. 53-66, 1992.
    • (1992) Journal of Cryptology , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.1
  • 14
    • 35048857905 scopus 로고    scopus 로고
    • Non-interactive timestamping in the bounded storage model
    • vol. 3152 of LNCS, Springer-Verlag
    • Tal Moran, Ronen Shaltiel, Amnon Ta-Shma. Non-interactive Timestamping in the Bounded Storage Model. In Proc. of CRYPTO 2004, vol. 3152 of LNCS, pp. 460-476. Springer-Verlag.
    • Proc. of CRYPTO 2004 , pp. 460-476
    • Moran, T.1    Shaltiel, R.2    Ta-Shma, A.3
  • 15
    • 0018543411 scopus 로고
    • Password security: A case history
    • R. Morris and K. Thompson. Password Security: A Case History, in Communications of the ACM, Vol. 22, no. 11, 1979, pp. 594-597.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 16
    • 0033075850 scopus 로고    scopus 로고
    • Extracting randomness: A survey and new constructions
    • February 26
    • N. Nisan and A. Ta-Shma. Extracting Randomness: A Survey and New Constructions, in Journal of Computer and System Sciences, February 1999, vol. 58, no. 1, pp. 148-173(26)
    • (1999) Journal of Computer and System Sciences , vol.58 , Issue.1 , pp. 148-173
    • Nisan, N.1    Ta-Shma, A.2
  • 21
    • 0036000527 scopus 로고    scopus 로고
    • Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors
    • Electronic Colloquium on Computational Complexity TR01-018; other versions
    • O. Reingold, S. Vadhan, and A. Wigderson. Entropy Waves, The Zig-Zag Graph Product, and New Constant-Degree Expanders and Extractors, in Electronic Colloquium on Computational Complexity TR01-018; other versions in Proceedings of FOCS 8000 and Annals of Mathematics, vol. 155, pp. 157-187, 2002.
    • (2002) Proceedings of FOCS 8000 and Annals of Mathematics , vol.155 , pp. 157-187
    • Reingold, O.1    Vadhan, S.2    Wigderson, A.3
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to Share a Secret. Communications of the ACM, Volume 22, Issue 11 (November 1979)
    • (1979) Communications of the ACM , vol.22 , Issue.11
    • Shamir, A.1
  • 23
    • 0012579059 scopus 로고    scopus 로고
    • Recent developments in explicit constructions of extractors
    • R. Shaltiel. Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS, 77:67-95, 2002.
    • (2002) Bulletin of the EATCS , vol.77 , pp. 67-95
    • Shaltiel, R.1
  • 25
    • 4344628859 scopus 로고    scopus 로고
    • On constructing locally computable extractors and cryptosystems in the bounded storage model
    • S. P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Journal of Cryptology, vol. 17, no. 1, pp. 43-77, 2004.
    • (2004) Journal of Cryptology , vol.17 , Issue.1 , pp. 43-77
    • Vadhan, S.P.1
  • 26
    • 33745616473 scopus 로고    scopus 로고
    • Proc. of the 1998 Internet Society Network and Distributed System Security Symposium 27
    • T. Wu, The secure remote password protocol, in Proc. of the 1998 Internet Society Network and Distributed System Security Symposium 27. http://money.cnn.com/2003/02/18/technology/creditcards/
    • The Secure Remote Password Protocol
    • Wu, T.1
  • 27
    • 33745634080 scopus 로고    scopus 로고
    • http://www.detnews.com/2005/technology/0506/18/tech-219662.htm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.