메뉴 건너뛰기




Volumn 4058 LNCS, Issue , 2006, Pages 395-406

Secure cross-realm C2C-PAKE protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; SECURITY OF DATA; SECURITY SYSTEMS; SERVERS;

EID: 33746374068     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11780656_33     Document Type: Conference Paper
Times cited : (28)

References (17)
  • 1
    • 24144444566 scopus 로고    scopus 로고
    • One-time verifier-based encrypted key exchange
    • LNCS 3386. Springer
    • Michel Abdalla, Olivier Chevassut, and David Pointcheval. One-time verifier-based encrypted key exchange. In PKC 2005, LNCS 3386, pages 47-64. Springer, 2005.
    • (2005) PKC 2005 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 2
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • LNCS 3386. Springer
    • Michel Abdalla, Pierre-Alain Fouque, and David Pointcheval. Password-based authenticated key exchange in the three-party setting. In PKC 2005, LNCS 3386, pages 65-84. Springer, 2005.
    • (2005) PKC 2005 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 3
    • 26444476977 scopus 로고    scopus 로고
    • Interactive diffie-hellman assumptions with applications to password-based authentication
    • LNCS 3570. Springer, 2005.
    • Michel Abdalla and David Pointcheval. Interactive diffie-hellman assumptions with applications to password-based authentication. In FC 2005, LNCS 3570, pages 341-356. Springer, 2005.
    • FC 2005 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS 1807. Springer
    • Mihir Bellare, David Pointcheval, and Phillip Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, LNCS 1807, pages 139-155. Springer, 2000.
    • (2000) EUROCRYPT 2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS 773. Springer
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In CRYPTO '93, LNCS 773, pages 232-249. Springer, 1993.
    • (1993) CRYPTO '93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ACM
    • Mihir Bellare and Phillip Rogaway. Provably secure session key distribution: the three party case. In STOC 1995, pages 57-66. ACM, 1995.
    • (1995) STOC 1995 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using diffie-hellman
    • LNCS 1807. Springer
    • Victor Boyko, Philip D. MacKenzie, and Sarvar Patel. Provably secure password-authenticated key exchange using diffie-hellman. In EUROCRYPT 2000, LNCS 1807, pages 156-171. Springer, 2000.
    • (2000) EUROCRYPT 2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.D.2    Patel, S.3
  • 9
    • 18744393738 scopus 로고    scopus 로고
    • Security proofs for an efficient password-based key exchange
    • ACM
    • Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. Security proofs for an efficient password-based key exchange. In CCS 2003, pages 241-250. ACM, 2003.
    • (2003) CCS 2003 , pp. 241-250
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • LNCS 2947. Springer
    • Emmanuel Bresson, Olivier Chevassut, and David Pointcheval. New security results on encrypted key exchange. In PKC 2004, LNCS 2947, pages 145-158. Springer, 2004.
    • (2004) PKC 2004 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 84944063128 scopus 로고    scopus 로고
    • Password-authenticated key exchange between clients with different passwords
    • LNCS 2513. Springer
    • Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, and Chang-Seop Park. Password-authenticated key exchange between clients with different passwords. In ICICS 2002, LNCS 2513, pages 134-146. Springer, 2002.
    • (2002) ICICS 2002 , pp. 134-146
    • Byun, J.W.1    Jeong, I.R.2    Lee, D.H.3    Park, C.-S.4
  • 13
    • 35048854202 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
    • LNCS 3043. Springer
    • Jeeyeon Kim, Seungjoo Kim, Jin Kwak, and Dongho Won. Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords. In ICCSA 2004, Part I, LNCS 3043, pages 895-902. Springer, 2004.
    • (2004) ICCSA 2004, Part I , pp. 895-902
    • Kim, J.1    Kim, S.2    Kwak, J.3    Won, D.4
  • 14
    • 84937579448 scopus 로고    scopus 로고
    • More efficient password-authenticated key exchange
    • LNCS 2020. Springer
    • Philip D. MacKenzie. More efficient password-authenticated key exchange. In CT-RSA 2001, LNCS 2020, pages 361-377. Springer, 2001.
    • (2001) CT-RSA 2001 , pp. 361-377
    • MacKenzie, P.D.1
  • 15
    • 33846461562 scopus 로고    scopus 로고
    • The pak suite: Protocols for password-authenticated key exchange
    • Submission to
    • Philip D. MacKenzie. The pak suite: Protocols for password-authenticated key exchange. In Submission to IEEE P1363.2, 2002.
    • (2002) IEEE P1363.2
    • MacKenzie, P.D.1
  • 16
    • 26444613363 scopus 로고    scopus 로고
    • Cryptanalysis of an improved client-to-client password-authenticated key exchange (c2c-pake) scheme
    • LNCS 3531
    • Raphael Chung-Wei Phan and Bok-Min Goi. Cryptanalysis of an improved client-to-client password-authenticated key exchange (c2c-pake) scheme. In ACNS 2005, LNCS 3531, pages 33-39, 2005.
    • (2005) ACNS 2005 , pp. 33-39
    • Phan, R.C.-W.1    Goi, B.-M.2
  • 17
    • 35048872322 scopus 로고    scopus 로고
    • Weaknesses of a password-authenticated key exchange protocol between clients with different passwords
    • LNCS 3089. Springer
    • Shuhong Wang, Jie Wang, and Maozhi Xu. Weaknesses of a password-authenticated key exchange protocol between clients with different passwords. In ACNS 2004, LNCS 3089, pages 414-425. Springer, 2004.
    • (2004) ACNS 2004 , pp. 414-425
    • Wang, S.1    Wang, J.2    Xu, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.