메뉴 건너뛰기




Volumn 3, Issue 1, 2006, Pages 35-38

Off-line password guessing attack on an efficient key agreement protocol for secure authentication

Author keywords

Authenticated key agreement; Cryptanalysis; Offline password guessing attack

Indexed keywords

AUTHENTICATED KEY AGREEMENT; CRYPTANALYSIS; KEY AGREEMENT PROTOCOL; OFFLINE PASSWORD GUESSING ATTACK; SECURE AUTHENTICATIONS;

EID: 34548135536     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (21)

References (11)
  • 3
    • 0032658583 scopus 로고    scopus 로고
    • Simple authenticated key agreement algorithm
    • D. H. Seo, and P. Sweeney, "Simple authenticated key agreement algorithm", Electronics Letters, vol. 35, no. 13, pp. 1073-1074, 1999.
    • (1999) Electronics Letters , vol.35 , Issue.13 , pp. 1073-1074
    • Seo, D.H.1    Sweeney, P.2
  • 5
    • 26844485818 scopus 로고    scopus 로고
    • An efficient key agreement protocol for secure authetnication
    • LNCS 3043, Springer-Verlag
    • Y. S. Kim, E. N. Huh, J. H. Hwang, and B. W. Lee, "An efficient key agreement protocol for secure authetnication", in ICCAS 2004, LNCS 3043, pp. 746-754, Springer-Verlag, 2004.
    • (2004) ICCAS 2004 , pp. 746-754
    • Kim, Y.S.1    Huh, E.N.2    Hwang, J.H.3    Lee, B.W.4
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning and G. Sacco, "Timestamps in key distribution protocols", Communications of the ACM, vol.24, no.8, 533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 8
    • 35248816546 scopus 로고    scopus 로고
    • Sigma: The 'sign-and-mac' approach to authenticated Diffie-Hellman and its use in the ikeprotocols
    • LNCS 2729, Springer-Verlag
    • H. Krawczyk, "Sigma: The 'sign-and-mac' approach to authenticated Diffie-Hellman and its use in the ikeprotocols", in Crypto 2003, LNCS 2729, pp. 400-425, Springer-Verlag, 2003.
    • (2003) Crypto 2003 , pp. 400-425
    • Krawczyk, H.1
  • 10
    • 33748173666 scopus 로고    scopus 로고
    • "Revist of McCullagh-Barreto two-party ID-based authenticated key agreement protocols
    • Nov
    • K.-K. R. Choo, "Revist of McCullagh-Barreto two-party ID-based authenticated key agreement protocols",International Journal of Network Security, vol.1, no.3, 154-160, Nov. 2005.
    • (2005) International Journal of Network Security , vol.1 , Issue.3 , pp. 154-160
    • Choo, K.-K.R.1
  • 11
    • 84874914559 scopus 로고    scopus 로고
    • Revisting Lee, Kim, & Yoo authenticated key agreement protocol
    • Jan
    • K.-K. R. Choo, "Revisting Lee, Kim, & Yoo authenticated key agreement protocol", International Journal of Network Security, vol.2, no.1, 64-68, Jan. 2006.
    • (2006) International Journal of Network Security , vol.2 , Issue.1 , pp. 64-68
    • Choo, K.-K.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.