메뉴 건너뛰기




Volumn 3921 LNCS, Issue , 2006, Pages 398-412

Guessing attacks and the computational soundness of static equivalence

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL INDISTINGUISHABILITY; EQUATIONAL THEORY; STATIC EQUIVALENCE;

EID: 33745790245     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11690634_27     Document Type: Conference Paper
Times cited : (30)

References (32)
  • 2
    • 35048822401 scopus 로고    scopus 로고
    • Deciding knowledge in security protocols under equational theories
    • Proc. 31st International Colloquium on Automata, Languages and Programming (ICALP'04), Springer
    • M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In Proc. 31st International Colloquium on Automata, Languages and Programming (ICALP'04), volume 3142 of LNCS, pages 46-58. Springer, 2004.
    • (2004) LNCS , vol.3142 , pp. 46-58
    • Abadi, M.1    Cortier, V.2
  • 5
    • 0000298407 scopus 로고    scopus 로고
    • A bisimulation method for cryptographic protocols
    • M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5(4):267-303, 1998.
    • (1998) Nordic Journal of Computing , vol.5 , Issue.4 , pp. 267-303
    • Abadi, M.1    Gordon, A.D.2
  • 6
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 7
    • 26444502046 scopus 로고    scopus 로고
    • Password-based encryption analyzed
    • Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), Springer
    • M. Abadi and B. Warinschi. Password-based encryption analyzed. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of LNCS, pages 664-676. Springer, 2005.
    • (2005) LNCS , vol.3580 , pp. 664-676
    • Abadi, M.1    Warinschi, B.2
  • 11
    • 26444541858 scopus 로고    scopus 로고
    • Computationally sound implementations of equational theories against passive adversaries
    • Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), Springer
    • M. Baudet, V. Cortier, and S. Kremer. Computationally sound implementations of equational theories against passive adversaries. In Proc. 32nd International Colloquium on Automata, Languages and Programming (ICALP'05), volume 3580 of LNCS, pages 652-663. Springer, 2005.
    • (2005) LNCS , vol.3580 , pp. 652-663
    • Baudet, M.1    Cortier, V.2    Kremer, S.3
  • 12
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology - EUROCRYPT'00, Springer
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Advances in Cryptology - EUROCRYPT'00, volume 1807 of LNCS, pages 139-155. Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 16
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology - EUROCRYPT'00, Springer
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Advances in Cryptology - EUROCRYPT'00, volume 1807 of LNCS, pages 156-171. Springer, 2000.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 17
    • 26444559794 scopus 로고    scopus 로고
    • Analysing password protocol security against off-line dictionary attacks
    • Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands
    • R. Corin, J. M. Doumen, and S. Etalle. Analysing password protocol security against off-line dictionary attacks. Technical report TR-CTIT-03-52, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, 2003.
    • (2003) Technical Report , vol.TR-CTIT-03-52
    • Corin, R.1    Doumen, J.M.2    Etalle, S.3
  • 20
    • 33745805266 scopus 로고    scopus 로고
    • Private communication
    • C. Fournet. Private communication, 2002.
    • (2002)
    • Fournet, C.1
  • 21
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Springer
    • R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In Advances in Cryptology - EUROCRYPT'03, volume 2656 of LNCS, pages 524-543. Springer, 2003.
    • (2003) Advances in Cryptology - EUROCRYPT'03 , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 22
    • 84880888233 scopus 로고    scopus 로고
    • Session key generation using human passwords only
    • Advances in Cryptology - CRYPTO'01, Springer
    • O. Goldreich and Y. Lindell. Session key generation using human passwords only. In Advances in Cryptology - CRYPTO'01, volume 2139 of LNCS, pages 403-432. Springer, 2001.
    • (2001) LNCS , vol.2139 , pp. 403-432
    • Goldreich, O.1    Lindell, Y.2
  • 25
    • 84945132563 scopus 로고    scopus 로고
    • Practical password-authenticated key exchange provably secure under standard assumptions
    • Advances in Cryptology EUROCRYPT'01, Springer
    • J. Katz, R. Ostrovsky, and M. Yung. Practical password-authenticated key exchange provably secure under standard assumptions. In Advances in Cryptology EUROCRYPT'01, volume 2045 of LNCS, pages 475-494. Springer, 2001.
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 26
    • 3543052976 scopus 로고    scopus 로고
    • Symmetric encryption in automatic analyses for confidentiality against active adversaries
    • P. Laud. Symmetric encryption in automatic analyses for confidentiality against active adversaries. In Proc. 2004 IEEE Symposium on Security and Privacy (SSP'04), pages 71-85, 2004.
    • (2004) Proc. 2004 IEEE Symposium on Security and Privacy (SSP'04) , pp. 71-85
    • Laud, P.1
  • 27
    • 0344875574 scopus 로고    scopus 로고
    • Analysing protocols subject to guessing attacks
    • G. Lowe. Analysing protocols subject to guessing attacks. Journal of Computer Security, 12(1):83-98, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 83-98
    • Lowe, G.1
  • 28
    • 0344875571 scopus 로고    scopus 로고
    • Completeness theorems for the Abadi-Rogaway logic of encrypted expressions
    • D. Micciancio and B. Warinschi. Completeness theorems for the Abadi-Rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004.
    • (2004) Journal of Computer Security , vol.12 , Issue.1 , pp. 99-129
    • Micciancio, D.1    Warinschi, B.2
  • 29
    • 35048899313 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of active adversaries
    • Proc. Theory of Cryptography Conference (TCC'04), Springer
    • D. Micciancio and B. Warinschi. Soundness of formal encryption in the presence of active adversaries. In Proc. Theory of Cryptography Conference (TCC'04), volume 2951 of LNCS, pages 133-151. Springer, 2004.
    • (2004) LNCS , vol.2951 , pp. 133-151
    • Micciancio, D.1    Warinschi, B.2
  • 30
    • 26444517444 scopus 로고    scopus 로고
    • About the security of ciphers (semantic security and pseudo-random permutations)
    • Proc. Selected Areas in Cryptography (SAC'04), Springer
    • D. H. Phan and D. Pointcheval. About the security of ciphers (semantic security and pseudo-random permutations). In Proc. Selected Areas in Cryptography (SAC'04), volume 3357 of LNCS, pages 185-200. Springer, 2004.
    • (2004) LNCS , vol.3357 , pp. 185-200
    • Phan, D.H.1    Pointcheval, D.2
  • 31
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM SIGOPS Oper. Syst. Rev., 29(3):22-30, 1995.
    • (1995) ACM SIGOPS Oper. Syst. Rev. , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.