메뉴 건너뛰기




Volumn 3225, Issue , 2004, Pages 134-145

On the security of key derivation functions

Author keywords

[No Author keywords available]

Indexed keywords

NUMBER THEORY; SECURITY OF DATA;

EID: 34548192021     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30144-8_12     Document Type: Article
Times cited : (14)

References (20)
  • 1
    • 0242603234 scopus 로고    scopus 로고
    • The Simple Public-Key GSS-API Mechanism (SPKM)
    • October
    • Adams, C., "The Simple Public-Key GSS-API Mechanism (SPKM)", RFC 2025, October 1996.
    • (1996) RFC , vol.2025
    • Adams, C.1
  • 4
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security
    • IEEE, for an abridged version
    • Bellare, M., R. Canetti, and H. Krawczyk, "Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security", http://www-cse.ucsd.edu/users/mihir/papers/cascade.pdf (see also Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996, for an abridged version).
    • (1996) Proceedings of the 37th Symposium on Foundations of Computer Science
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
  • 8
    • 84965066515 scopus 로고    scopus 로고
    • Advanced Encryption Standard (AES)
    • FIPS 197, "Advanced Encryption Standard (AES)", Federal Information Processing Standards Publication 197, 2001. Available from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
    • (2001) Federal Information Processing Standards Publication 197
  • 9
    • 0004249393 scopus 로고    scopus 로고
    • draftfreier-ssl-version3-02.txt, November 18, work in progress.
    • Freier, A., Karlton, P., and P. Kocher, "The SSL Protocol Version 3.0", draftfreier-ssl-version3-02.txt, November 18, 1996 (work in progress). Available at http://wp.netscape.com/eng/ssl3/draft302.txt.
    • (1996) The SSL Protocol Version 3.0
    • Freier, A.1    Karlton, P.2    Kocher, P.3
  • 10
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • November
    • Harkins, D., and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998.
    • (1998) RFC , vol.2409
    • Harkins, D.1    Carrel, D.2
  • 14
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-Hashing for Message Authentication
    • February
    • Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
    • (1997) RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 15
    • 35048843081 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Special Publication 800-56: Recommendation On Key Establishment Schemes, Draft 2.0, January
    • National Institute of Standards and Technology, Special Publication 800-56: Recommendation On Key Establishment Schemes, Draft 2.0, January 2003.
    • (2003)
  • 16
    • 35048830230 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Special Publication 800-57: Recommendation For Key Management - Part 1: General Guideline, Draft, January
    • National Institute of Standards and Technology, Special Publication 800-57: Recommendation For Key Management - Part 1: General Guideline, Draft, January 2003.
    • (2003)
  • 17
    • 84899234378 scopus 로고    scopus 로고
    • March 25
    • PKCS #5 v2.0, Password-Based Cryptography Standard, March 25, 1999. Available from ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-5v2/pkcs5v2-0.pdf.
    • (1999) Password-Based Cryptography Standard
  • 18
    • 0242674155 scopus 로고    scopus 로고
    • Diffie-Hellman Key Agreement Method
    • June
    • Rescorla, E., "Diffie-Hellman Key Agreement Method", RFC 2631, June 1999.
    • (1999) RFC , vol.2631
    • Rescorla, E.1
  • 19
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • April
    • Rivest, R., "The MD5 message-digest algorithm", RFC 1321, April 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 20
    • 74549196057 scopus 로고
    • How to swindle Rabin
    • Yuval, G., "How to swindle Rabin", Cryptologia, 3 (1979), pp. 187-190.
    • (1979) Cryptologia , vol.3 , pp. 187-190
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.