메뉴 건너뛰기




Volumn 3958 LNCS, Issue , 2006, Pages 395-409

SAS-based authenticated key agreement

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; RANDOM PROCESSES;

EID: 33745832230     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11745853_26     Document Type: Conference Paper
Times cited : (44)

References (19)
  • 1
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • [BR93] Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., Springer-Verlag
    • [BR93] Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Douglas R. Stinson, editor, Advances in Cryptology - CRYPTO '93: 13th Annual International Cryptology Conference, volume 773 of Lecture Notes in Computer Science, pages 232-249, Santa Barbara, California, U.S.A., 1993. Springer-Verlag.
    • (1993) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • [CS02] Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02: International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April. Springer-Verlag
    • [CS02] Ronald Cramer and Victor Shoup. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In Lars R. Knudsen, editor, Advances in Cryptology - EUROCRYPT '02: International Conference on the Theory and Applications of Cryptographic Techniques, volume 2332 of Lecture Notes in Computer Science, Amsterdam, The Netherlands, April 2002. Springer-Verlag.
    • (2002) Lecture Notes in Computer Science , vol.2332
    • Cramer, R.1    Shoup, V.2
  • 5
    • 0017018484 scopus 로고
    • New directions in cryptography
    • [DH76], November
    • [DH76] Whitfield Diffie and Martin E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644-654, November 1976.
    • (1976) IEEE Transactions on Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 6
    • 33745844079 scopus 로고    scopus 로고
    • [DSS00] Digital signature standard (DSS). Federal Information Processing Standard, Publication 186-2, U.S. Department of Commerce, National Institute of Standards and Technology, 2000
    • [DSS00] Digital signature standard (DSS). Federal Information Processing Standard, Publication 186-2, U.S. Department of Commerce, National Institute of Standards and Technology, 2000.
  • 7
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • [GMN04], January
    • [GMN04] Christian Gehrmann, Chris J. Mitchell, and Kaisa Nyberg. Manual authentication for wireless devices. RSA Cryptobytes, 7(1):29-37, January 2004.
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 8
    • 33645409711 scopus 로고    scopus 로고
    • Enhancements to Bluetooth baseband security
    • [GN01], Copenhagen, Denmark, November
    • [GN01] Christian Gehrmann and Kaisa Nyberg. Enhancements to Bluetooth baseband security. In Nordsee '01, Copenhagen, Denmark, November 2001.
    • (2001) Nordsee '01
    • Gehrmann, C.1    Nyberg, K.2
  • 9
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • [GN04]
    • [GN04] Christian Gehrmann und Kaisa Nyberg. Security in personal area networks. Security for Mobility, pages 191-230, 2004.
    • (2004) Security for Mobility , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 10
    • 34247333484 scopus 로고    scopus 로고
    • The ephemeral pairing problem
    • [Hoe04] Ari Juels, editor, Financial Cryptography: the 8th International Conference (FC'04), Key West, FL, USA, February. Springer-Verlag
    • Jaap-Henk Hoepman. The ephemeral pairing problem. In Ari Juels, editor, Financial Cryptography: the 8th International Conference (FC'04), volume 3110 of Lecture Notes in Computer Science, pages 212-226, Key West, FL, USA, February 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 11
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • [Kra94] Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94: 11th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • [Kra94] Hugo Krawczyk. LFSR-based hashing and authentication. In Yvo Desmedt, editor, Advances in Cryptology - CRYPTO '94: 11th Annual International Cryptology Conference, volume 839 of Lecture Notes in Computer Science, pages 129-139, Santa Barbara, California, U.S.A., August 1994. Springer-Verlag.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 12
    • 51249099680 scopus 로고    scopus 로고
    • Efficient mutual data authentication using manually authenticated strings
    • [LAN05]
    • [LAN05] Sven Laur, N. Asokan, and Kaisa Nyberg. Efficient mutual data authentication using manually authenticated strings. Cryptology ePrint Archive, Report 2005/424, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.424
    • Laur, S.1    Asokan, N.2    Nyberg, K.3
  • 13
    • 35048882590 scopus 로고    scopus 로고
    • On simulation-sound trapdoor commitments
    • [MY04] Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT '04: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May. Springer-Verlag
    • [MY04] Philip MacKenzie and Ke Yang. On simulation-sound trapdoor commitments. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT '04 : International Conference on the Theory and Applications of Cryptographic Techniques, volume 3027 of Lecture Notes in Computer Science, pages 382-400, Interlaken, Switzerland, May 2004. Springer-Verlag.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 382-400
    • MacKenzie, P.1    Yang, K.2
  • 14
    • 33745637238 scopus 로고    scopus 로고
    • An optimal non-interactive message authentication protocol
    • [PV06] David Pointcheval, editor, Topics in Cryptology - CT-RSA '06: The Cryptographers' Track at the RSA Conference 2006, San Jose, California, U.S.A., February. Springer-Verlag
    • [PV06] Sylvain Pasini and Serge Vaudenay. An optimal non-interactive message authentication protocol. In David Pointcheval, editor, Topics in Cryptology - CT-RSA '06: The Cryptographers' Track at the RSA Conference 2006, volume 3860 of Lecture Notes in Computer Science, pages 280-294, San Jose, California, U.S.A., February 2006. Springer-Verlag.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 280-294
    • Pasini, S.1    Vaudenay, S.2
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • [RSA78] Februar
    • [RSA78] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21 (2): 120-126, Februar 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 16
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • [Sti91] Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91: 11th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • [Sti91] Douglas Stinson. Universal hashing and authentication codes. In Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91: 11th Annual International Cryptology Conference, volume 576 of Lecture Notes in Computer Science, pages 74-85, Santa Barbara, California, U.S.A., August 1991. Springer-Verlag.
    • (1991) Lecture Notes in Computer Science , vol.576 , pp. 74-85
    • Stinson, D.1
  • 17
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • [Sti94]
    • [Sti94] Douglas Stinson. Universal hashing and authentication codes. Designs, Codes and Cryptography, 4:369-380, 1994.
    • (1994) Designs, Codes and Cryptography , vol.4 , pp. 369-380
    • Stinson, D.1
  • 18
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated strings
    • [Vau05] Victor Shoup, editor, Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, Santa Barbara, California, U.S.A., August. Springer-Verlag
    • [Vau05] Serge Vaudenay. Secure communications over insecure channels based on short authenticated strings. In Victor Shoup, editor, Advances in Cryptology - CRYPTO '05: The 25th Annual International Cryptology Conference, volume 3621 of Lecture Notes in Computer Science, pages 309-326, Santa Barbara, California, U.S.A., August 2005. Springer-Verlag.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 19
    • 33744911390 scopus 로고    scopus 로고
    • On Bluetooth repairing: Key agreement based on symmetric-key cryptography
    • [Vau06] Dengguo Feng, Dongdai Lin, and Moti Yung, editors, Information Security and Cryptology: First SKLOIS Conference, CISC'05, Beijing, China, December. Springer-Verlag
    • [Vau06] Serge Vaudenay. On Bluetooth repairing: Key agreement based on symmetric-key cryptography. In Dengguo Feng, Dongdai Lin, and Moti Yung, editors, Information Security and Cryptology: First SKLOIS Conference, CISC'05, volume 3822 of Lecture Notes in Computer Science, pages 1-9, Beijing, China, December 2006. Springer-Verlag.
    • (2006) Lecture Notes in Computer Science , vol.3822 , pp. 1-9
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.