메뉴 건너뛰기




Volumn 3329, Issue , 2004, Pages 230-244

New approaches to password authenticated key exchange based on RSA

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33745922955     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30539-2_17     Document Type: Article
Times cited : (32)

References (28)
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attack
    • Advances in Cryptology - EUROCRYPT 2000 Proceedings, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated key exchange secure against dictionary attack, Advances in Cryptology - EUROCRYPT 2000 Proceedings, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, 2000, pp. 139-155.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption
    • Advances in Cryptology - EUROCRYPT '94 proceedings, Springer-Verlag
    • M. Bellare and P. Rogaway, Optimal asymmetric encryption, Advances in Cryptology - EUROCRYPT '94 proceedings, Lecture Notes in Computer Science, vol. 950, Springer-Verlag, 1995, pp. 92-111.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84945119254 scopus 로고
    • Entity Authentication and key distribution
    • Advances in Cryptology - CRYPTO'93 Proceedings, Springer-Verlag
    • M. Bellare and P. Rogaway, Entity Authentication and key distribution, Advances in Cryptology - CRYPTO'93 Proceedings, Lecture Notes in Computer Science, vol. 773, Springer-Verlag, 1994, pp. 22-26.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 22-26
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • ACM, November
    • S. M. Bellovin and M. Merritt, Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise, Proc. of the 1st ACM Conference on Computer and Communications Security, ACM, November 1993, pp. 244-250.
    • (1993) Proc. of the 1st ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 78650941074 scopus 로고    scopus 로고
    • Simplified OAEP for the RSA and Rabin functions
    • Advances in Cryptology - CRYPTO 2001 Proceedings, Springer-Verlag
    • D. Boneh, Simplified OAEP for the RSA and Rabin functions, Advances in Cryptology - CRYPTO 2001 Proceedings, Lecture Notes in Computer Science, vol. 2139, Springer-Verlag, 2001, pp. 275-291.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 275-291
    • Boneh, D.1
  • 8
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology - EUROCRYPT 2000 Proceedings, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, Provably secure password authenticated key exchange using Diffie-Hellman, Advances in Cryptology - EUROCRYPT 2000 Proceedings, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, 2000, pp. 156-171.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 10
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Advances in Cryptology - EUROCRYPT 2003 Proceedings, Springer-Verlag
    • R. Gennaro and Y. Lindell, A framework for password-based authenticated key exchange, Advances in Cryptology - EUROCRYPT 2003 Proceedings, Lecture Notes in Computer Science, vol. 2656, Springer-Verlag, 2003, pp.524-542.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 524-542
    • Gennaro, R.1    Lindell, Y.2
  • 11
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • Advances in Cryptology - CRYPTO 2001 Proceedings, Springer-Verlag
    • O. Goldreich and Y. Lindell, Session-key generation using human passwords only, Advances in Cryptology - CRYPTO 2001 Proceedings, Lecture Notes in Computer Science, vol. 2139, Springer-Verlag, 2001, pp.408-432.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 13
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, Strong password-only authenticated key exchange, Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, 1996, pp. 5-26.
    • (1996) Computer Communication Review, ACM SIGCOMM , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 14
    • 35048828730 scopus 로고    scopus 로고
    • D. Jablon, http://www.integritysciences.com.
    • Jablon, D.1
  • 15
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Advances in Cryptology - EUROCRYPT 2001 Proceedings, Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung, Efficient password-authenticated key exchange using human-memorable passwords, Advances in Cryptology - EUROCRYPT 2001 Proceedings, Lecture Notes in Computer Science, vol. 2045, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 16
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • K. Kobara and H. Imai, Pretty-simple password-authenticated key-exchange under standard assumptions, IEICE Trans., vol. E85-A, no. 10, 2002, pp. 2229-2237.
    • (2002) IEICE Trans. , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 18
    • 84957025686 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Proc. Security Protocol Workshop, Springer-Verlag
    • S. Lucks, Open key exchange: How to defeat dictionary attacks without encrypting public keys, Proc. Security Protocol Workshop, Lecture Notes in Computer Science, vol. 1361, Springer-Verlag, 1997, pp. 79-90.
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 19
    • 84937402236 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • Advances in Cryptology-ASIACRYPT 2000 Proceedings, Springer-Verlag
    • P. MacKenzie, S. Patel, and R. Swaminathan, Password-authenticated key exchange based on RSA, Advances in Cryptology-ASIACRYPT 2000 Proceedings, Lecture Notes in Computer Science, vol. 1976, Springer-Verlag, 2000, pp. 599-613.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 21
    • 35048854655 scopus 로고    scopus 로고
    • Simpler session-key generation from short random passwords
    • Proc. TCC 2004, Springer-Verlag
    • M. Nguyen and S. P. Vadhan, Simpler session-key generation from short random passwords, Proc. TCC 2004, Lecture Notes in Computer Science, vol. 2951, Springer-Verlag, 2004, pp. 428-445.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 428-445
    • Nguyen, M.1    Vadhan, S.P.2
  • 22
    • 0030648441 scopus 로고    scopus 로고
    • Number theoretic attacks on secure password schemes
    • Oakland, California, May 5-7
    • S. Patel, Number theoretic attacks on secure password schemes, Proc. IEEE Symposium on Security and Privacy, Oakland, California, May 5-7, 1997.
    • (1997) Proc. IEEE Symposium on Security and Privacy
    • Patel, S.1
  • 24
    • 0346895367 scopus 로고    scopus 로고
    • More efficient password authenticated key exchange based on RSA
    • INDOCRYPT 2003 Proceedings, Springer-Verlag
    • D. Wong, A. Chan, and F. Zhu, More efficient password authenticated key exchange based on RSA, INDOCRYPT 2003 Proceedings, Lecture Notes in Computer Science, vol. 2904, Springer-Verlag, 2003, pp. 375-387.
    • (2003) Lecture Notes in Computer Science , vol.2904 , pp. 375-387
    • Wong, D.1    Chan, A.2    Zhu, F.3
  • 27
    • 84945247158 scopus 로고    scopus 로고
    • RSA-based password authenticated key exchange for imbalanced wireless networks
    • Proc. Information Security Conference 2003 (ISC'02), Springer-Verlag
    • F. Zhu, D. Wong, A. Chan, and R. Ye, RSA-based password authenticated key exchange for imbalanced wireless networks, Proc. Information Security Conference 2003 (ISC'02), Lecture Notes in Computer Science, vol. 2433, Springer-Verlag, 2002, pp.150-161.
    • (2002) Lecture Notes in Computer Science , vol.2433 , pp. 150-161
    • Zhu, F.1    Wong, D.2    Chan, A.3    Ye, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.