메뉴 건너뛰기




Volumn 1, Issue 3, 2007, Pages 111-118

Non-interactive two-channel message authentication based on hybrid-collision resistant hash functions

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); NETWORK PROTOCOLS;

EID: 34648828586     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs:20060131     Document Type: Article
Times cited : (10)

References (11)
  • 1
    • 24644434353 scopus 로고    scopus 로고
    • Security in personal area networks
    • London
    • Gehrmann, C., and Nyberg, K.: ' Security in personal area networks ', Security for Mobility, IEE, London, 2004, p. 191-230
    • (2004) Security for Mobility, IEE , pp. 191-230
    • Gehrmann, C.1    Nyberg, K.2
  • 2
    • 23944521144 scopus 로고    scopus 로고
    • Manual authentication for wireless devices
    • Gehrmann, C., Mitchell, C.J., and Nyberg, K.: ' Manual authentication for wireless devices ', RSA Cryptobytes, 2004, 7, (1), p. 29-37
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.J.2    Nyberg, K.3
  • 3
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad hoc wireless networks
    • Christianson B. Crispo B. Roe M. Lecture Notes in Computer Science
    • Stajano, F., and Anderson, R.: Christianson, B., Crispo, B., Roe, M., ' The resurrecting duckling: Security issues for ad hoc wireless networks ', Security protocols, 7th Int. Workshop Proceedings, 1999, Lecture Notes in Computer Science
    • (1999) Security Protocols, 7th Int. Workshop Proceedings
    • Stajano, F.1    Anderson, R.2
  • 5
    • 33745156127 scopus 로고    scopus 로고
    • Secure communications over insecure channels based on short authenticated string
    • ShouV. Santa Barbara, CA, August Springer
    • Vaudenay, S.: Shoup, V., ' Secure communications over insecure channels based on short authenticated string ', Advances in Cryptography, Lecture Notes in Computer Science, Santa Barbara, CA, August, 2005, Springer, 3621, p. 309-326
    • (2005) Advances in Cryptography, Lecture Notes in Computer Science , vol.3621 , pp. 309-326
    • Vaudenay, S.1
  • 6
    • 33745637238 scopus 로고    scopus 로고
    • An optimal non-interactive message authentication protocol
    • Pointcheval D. San Jose, CA, February Springer Lecture Notes in Computer Science
    • Pasini, S., and Vaudenay, S.: Pointcheval, D., ' An optimal non-interactive message authentication protocol ', Topics in Cryptography, San Jose, CA, February, 2006, Springer, 3860, p. 280-294, Lecture Notes in Computer Science
    • (2006) Topics in Cryptography , vol.3860 , pp. 280-294
    • Pasini, S.1    Vaudenay, S.2
  • 7
    • 0025056443 scopus 로고
    • A discrete logarithm implementation of perfect zeroknowledge blobs
    • 0933-2790
    • Boyar, J.F., and Kurtz, S.A.: ' A discrete logarithm implementation of perfect zeroknowledge blobs ', J. Cryptol., 1990, 2, (2), p. 63-76 0933-2790
    • (1990) J. Cryptol. , vol.2 , Issue.2 , pp. 63-76
    • Boyar, J.F.1    Kurtz, S.A.2
  • 9
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern J. Prague, Czech Republic, May Springer Lecture Notes in Computer Science
    • Paillier, P.: Stern, J., ' Public-key cryptosystems based on composite degree residuosity classes ', 'Advances in Cryptology-EUROCRYPT '99: Int. Conf. Theory and Application of Cryptographic Techniques', Prague, Czech Republic, May, 1999, Springer, 1592, p. 223-238, Lecture Notes in Computer Science
    • (1999) 'Advances in Cryptology-EUROCRYPT '99: Int. Conf. Theory and Application of Cryptographic Techniques' , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 10
    • 33749546005 scopus 로고    scopus 로고
    • Tight bounds for unconditional authentication protocols in the manual channel and shared key models
    • Naor, M., Segev, G., and Smith, A.: ' Tight bounds for unconditional authentication protocols in the manual channel and shared key models ', Advances in Cryptology - CRYPTO '06, 2006, p. 214-231
    • (2006) Advances in Cryptology - CRYPTO '06 , pp. 214-231
    • Naor, M.1    Segev, G.2    Smith, A.3
  • 11
    • 34648873168 scopus 로고    scopus 로고
    • Technical Report 02 University of Waterloo, Centre for Applied Cryptographic Research (CACR), Canada, 2007
    • ' Interactive two-channel message authentication based on interactive-collision resistant hash functions ', Technical Report, 02, University of Waterloo, Centre for Applied Cryptographic Research (CACR), Canada, 2007


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.