메뉴 건너뛰기




Volumn 3110, Issue , 2004, Pages 212-226

The ephemeral pairing problem

Author keywords

Authentication; Identification; Key exchange; Pairing

Indexed keywords

AUTHENTICATION; BANDWIDTH; IDENTIFICATION (CONTROL SYSTEMS);

EID: 34247333484     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27809-2_22     Document Type: Article
Times cited : (48)

References (18)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • [BPR00] EUROCRYPT 2000 Bruges, Belgium, B. Preneel (Ed.), Springer
    • [BPR00] BELLARE, M., POINTCHEVAL, D., AND ROGAWAY, P. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 139-155.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 2
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • [BM92] Oakland, CA, USA, IEEE
    • [BM92] BELLOVIN, S. M., AND MERRITT, M. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security & Privacy (Oakland, CA, USA, 1992), IEEE, pp. 72-84.
    • (1992) IEEE Security & Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 3
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • [BM93] Fairfax, VA, USA, ACM
    • [BM93] BELLOVIN, S. M., AND MERRITT, M. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In 1st CCS (Fairfax, VA, USA, 1993), ACM, pp. 244-250.
    • (1993) 1st CCS , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • [Bon98] Proc. of the 3rd Algorithmic Number Theory Symp.
    • [Bon98] BONEH, D. The decision Diffie-Hellman problem. In Proc. of the 3rd Algorithmic Number Theory Symp. (1998), LNCS 1423, pp. 48-63.
    • (1998) LNCS , vol.1423 , pp. 48-63
    • Boneh, D.1
  • 5
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • [BMP00] EUROCRYPT 2000 Bruges, Belgium, B. Preneel (Ed.), Springer
    • [BMP00] BOYKO, V., MACKENZIE, P., AND PATEL, S. Provably secure password-authenticated key exchange using Diffie-Hellman. In EUROCRYPT 2000 (Bruges, Belgium, 2000), B. Preneel (Ed.), LNCS 1807, Springer, pp. 156-171.
    • (2000) LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • [CK01] EUROCRYPT 2001 Innsbruck, Austria, B. Pfitzmann (Ed.), Springer
    • [CK01] CANETTI, R., AND KRAWCZYK, H. Analysis of key-exchange protocols and their use for building secure channels. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 453-474.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 8
    • 0017018484 scopus 로고
    • New directions in cryptography
    • [DH76]
    • [DH76] DIFFIE, W., AND HELLMAN, M. E. New directions in cryptography. IEEE Trans. Inf. Theory IT-11 (1976), 644-654.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-11 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 10
    • 24144468439 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • [GL03] IBM T.J. Watson, 2003. Abstract appeared in EUROCRYPT
    • [GL03] GENNARO, R., AND LINDELL, Y. A framework for password-based authenticated key exchange. Tech. rep., IBM T.J. Watson, 2003. Abstract appeared in EUROCRYPT 2003.
    • (2003) Tech. Rep.
    • Gennaro, R.1    Lindell, Y.2
  • 11
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • [Jab96]
    • [Jab96] JABLON, D. P. Strong password-only authenticated key exchange. Comput. Comm. Rev. (1996). http://www.std.com/~dpj and www.integritysciences. com.
    • (1996) Comput. Comm. Rev.
    • Jablon, D.P.1
  • 12
    • 84904204049 scopus 로고    scopus 로고
    • Security modelling for electronic commerce: The common electronic purse specifications
    • [JW01] Zürich, Switzerland, Kluwer
    • [JW01] JÜRJENS, J., AND WIMMEL, G. Security modelling for electronic commerce: The common electronic purse specifications. In First IFIP conference on e-commerce, e-business, and e-government (I3E) (Zürich, Switzerland, 2001), Kluwer.
    • (2001) First IFIP Conference on E-commerce, E-business, and E-government (I3E)
    • Jürjens, J.1    Wimmel, G.2
  • 13
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • [KOY01] EUROCRYPT 2001 Innsbruck, Austria, B. Pfitzmann (Ed.), Springer
    • [KOY01] KATZ, J., OSTROVSKY, R., AND YUNG, M. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001 (Innsbruck, Austria, 2001), B. Pfitzmann (Ed.), LNCS 2045, Springer, pp. 475-494.
    • (2001) LNCS , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 14
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • [Luc97]
    • [Luc97] LUCKS, S. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In The Security Protocol Workshop '97 (1997), pp. 79-90.
    • (1997) The Security Protocol Workshop '97 , pp. 79-90
    • Lucks, S.1
  • 15
    • 84937579448 scopus 로고    scopus 로고
    • More efficient password-authenticated key exchange
    • [Mac01] Topics in Cryptography (CT-RSA) Springer
    • [Mac01] MACKENZIE, P. More efficient password-authenticated key exchange. In Topics in Cryptography (CT-RSA) (2001), LNCS 2020, Springer, pp. 361-377.
    • (2001) LNCS , vol.2020 , pp. 361-377
    • Mackenzie, P.1
  • 16
    • 35048845896 scopus 로고    scopus 로고
    • Solution to Bluetooth multiuser problem using method of tokens
    • [Mob01] MOBILE ELECTRONIC TRANSACTIONS.
    • [Mob01] MOBILE ELECTRONIC TRANSACTIONS. Solution to Bluetooth multiuser problem using method of tokens. Tech. rep., 2001. http://www.mobiletransaction. org/.
    • (2001) Tech. Rep.
  • 17
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • [Sho99] IBM, Invited talk at ACM Computer and Communications Security conference, 1999
    • [Sho99] SHOUP, V. On formal models for secure key exchange. Tech. Rep. RZ 3120 (#93166), IBM, 1999. Invited talk at ACM Computer and Communications Security conference, 1999.
    • (1999) Tech. Rep. RZ 3120 (#93166)
    • Shoup, V.1
  • 18
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • [SA99] B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS
    • [SA99] STAJANO, F., AND ANDERSON, R. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Procotols, 7th Int. Workshop (1999), B. Christianson, B. Crispo, and M. Roe (Eds.), LNCS, pp. 172-194.
    • (1999) Security Procotols, 7th Int. Workshop , pp. 172-194
    • Stajano, F.1    Anderson, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.