메뉴 건너뛰기




Volumn 2951, Issue , 2004, Pages 428-445

Simpler session-key generation from short random passwords

Author keywords

[No Author keywords available]

Indexed keywords

GOLD;

EID: 35048854655     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24638-1_24     Document Type: Article
Times cited : (24)

References (24)
  • 1
    • 0036949106 scopus 로고    scopus 로고
    • Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model
    • Barak, B.: Constant-Round Coin-Tossing With a Man in the Middle or Realizing the Shared Random String Model. IEEE Symposium on Foundations of Computer Science (2002) 345-355
    • (2002) IEEE Symposium on Foundations of Computer Science , pp. 345-355
    • Barak, B.1
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Advances in Cryptology-Eurocrypt 2000 Proceedings
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. Advances in Cryptology-Eurocrypt 2000 Proceedings, Lecture Notes in Computer Science 1807 (2000) 139-155
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Advances in Cryptology - Crypto 93 Proceedings, Lecture
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. Advances in Cryptology - Crypto 93 Proceedings, Lecture Notes in Computer Science 773 (1994) 232-249
    • (1994) Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
    • Bellovin, S., Merritt, M.: Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. ACM Conference on Computer and Communications Security (1993) 244-250
    • (1993) ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 7
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • Advances in Cryptology-Eurocrypt 2000 Proceedings
    • Boyko, V., MacKenzie, P., Patel, S.: Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman. Advances in Cryptology-Eurocrypt 2000 Proceedings, Lecture Notes in Computer Science 1807 (2000) 156-171
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 8
    • 0035163054 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols
    • Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. IEEE Symposium on Foundations of Computer Science (2001) 136-145
    • IEEE Symposium on Foundations of Computer Science , vol.2001 , pp. 136-145
    • Canetti, R.1
  • 9
    • 0023985259 scopus 로고
    • Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
    • Chor, B., Goldreich, O.: Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity. SIAM Journal on Computing 17:2 (1988) 230-261
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 11
    • 35248830706 scopus 로고    scopus 로고
    • A Framework for Password-Based Authenticated Key Exchange
    • Advances in Cryptology - Eurocrypt 2003 Proceedings
    • Gennaro, R., Lindell, Y.: A Framework for Password-Based Authenticated Key Exchange. Advances in Cryptology - Eurocrypt 2003 Proceedings, Lecture Notes in Computer Science 2656 (2003) 524-543
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 524-543
    • Gennaro, R.1    Lindell, Y.2
  • 12
    • 84880888233 scopus 로고    scopus 로고
    • Session-Key Generation Using Human Passwords only
    • Advances in Cryptology - Crypto 2001 Proceedings
    • Goldreich, O., Lindell, Y.: Session-Key Generation Using Human Passwords Only. Advances in Cryptology - Crypto 2001 Proceedings, Lecture Notes in Computer Science 2139 (2001) 408-432
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 13
    • 0031504510 scopus 로고    scopus 로고
    • Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing
    • Goldreich, O., Wigderson, A.: Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing. Random Structures and Algorithms 11:4 (1997) 315-343
    • (1997) Random Structures and Algorithms , vol.11 , Issue.4 , pp. 315-343
    • Goldreich, O.1    Wigderson, A.2
  • 16
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Advances in Cryptology - Eurocrypt 2001 Proceedings
    • Katz, J., Ostrovsky, R., Yung, M.: Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords. Advances in Cryptology - Eurocrypt 2001 Proceedings, Lecture Notes in Computer Science 2045 (2001) 475-494
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 17
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-Simple Password-Authenticated Key-Exchange under Standard Assumptions
    • Kobara, K., Imai, H.: Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions. IECIE Trans. E85-A:10 (2002) 2229-2237
    • (2002) IECIE Trans. , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 18
    • 0023985474 scopus 로고
    • The Notion of Security for Probabilistic Cryptosystems
    • Micali, S., Rackoff, C., Sloan, B.: The Notion of Security for Probabilistic Cryptosystems. SIAM Journal on Computing 17 (1988) 412-426
    • (1988) SIAM Journal on Computing , vol.17 , pp. 412-426
    • Micali, S.1    Rackoff, C.2    Sloan, B.3
  • 21
    • 84957621865 scopus 로고    scopus 로고
    • On the Concurrent Composition of Zero-Knowledge Proofs
    • Advances in Cryptology - Eurocrypt 99 Proceedings
    • Richardson, R., Kilian, J.: On the Concurrent Composition of Zero-Knowledge Proofs. Advances in Cryptology - Eurocrypt 99 Proceedings, Lecture Notes in Computer Science 1592 (1999) 415-431
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 415-431
    • Richardson, R.1    Kilian, J.2
  • 22
    • 0004023090 scopus 로고    scopus 로고
    • On Formal Models for Secure Key Exchange
    • Report 1999/012
    • Shoup, V.: On Formal Models for Secure Key Exchange. Cryptology ePrint Archive (1999) Report 1999/012
    • (1999) Cryptology EPrint Archive
    • Shoup, V.1
  • 24
    • 0002839106 scopus 로고
    • Refinement and Extension of Encrypted Key Exchange
    • Steiner, M., Tsudik, G., Waidner, M.: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29:3 (1995) 22-30
    • (1995) Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.