메뉴 건너뛰기




Volumn 3043, Issue , 2004, Pages 895-902

Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 35048854202     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24707-4_102     Document Type: Article
Times cited : (39)

References (10)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology - Eurocrypt 2000, Springer-Verlag
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated key exchange secure against dictionary attacks. Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science, Vol. 1807. Springer-Verlag (2000) 139-155.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • Advances in Cryptology - Eurocrypt 2000, Springer-Verlag
    • Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. Advances in Cryptology - Eurocrypt 2000, Lecture Notes in Computer Science, Vol. 1807. Springer-Verlag (2000) 156-171.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 4
    • 84944063128 scopus 로고    scopus 로고
    • Password-Authenticated Key Exchange between Clients with Different Passwords
    • 4th International Conference on Information and Communications Security, ICICS 2002
    • Byun, J.W., Jeong, I.R., Lee, D.H., Park, O.S.: Password-Authenticated Key Exchange between Clients with Different Passwords. 4th International Conference on Information and Communications Security, ICICS 2002, Lecture Notes in Computer Science, Vol. 2513. (2002) 134-146.
    • (2002) Lecture Notes in Computer Science , vol.2513 , pp. 134-146
    • Byun, J.W.1    Jeong, I.R.2    Lee, D.H.3    Park, O.S.4
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • Denning, D., Sacco, G. : Timestamps in key distribution protocols. Communications of the ACM, Vol.24, No.8 (1981) 533-536.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 7
    • 84880888233 scopus 로고    scopus 로고
    • Session-Key Generation Using Human Passwords only
    • Advances in Cryptology - Crypto2001, Springer-Verlag
    • Goldreich, O., Lindell, Y.: Session-Key Generation Using Human Passwords Only. Advances in Cryptology - Crypto2001, Lecture Notes in Computer Science, Vol. 2139. Springer-Verlag (2001) 408-432.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 8
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated key exchange Using Human-Memorable Passwords
    • Advances in Cryptology - Eurocrypt2001, Springer-Verlag
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated key exchange Using Human-Memorable Passwords. Advances in Cryptology - Eurocrypt2001, Lecture Notes in Computer Science, Vol. 2045. Springer-Verlag (2001) 475-494.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 9
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • Steiner, M., Tsudik, G., Waider, M.: Refinement and extension of encrypted key exchange. ACM Operation Sys. Review, Vol.29, No.3 (1995) 22-30.
    • (1995) ACM Operation Sys. Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waider, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.