메뉴 건너뛰기




Volumn 2947, Issue , 2004, Pages 145-158

New security results on encrypted key exchange

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; CRYPTOGRAPHY; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY;

EID: 35048866891     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24632-9_11     Document Type: Article
Times cited : (141)

References (14)
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Against Dictionary Attacks
    • Springer-Verlag, Berlin
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In Eurocrypt '00, LNCS 1807, pages 139-155. Springer-Verlag, Berlin, 2000.
    • (2000) Eurocrypt '00, LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 18744413077 scopus 로고    scopus 로고
    • The AuthA Protocol for Password-Based Authenticated Key Exchange
    • March
    • M. Bellare and P. Rogaway. The AuthA Protocol for Password-Based Authenticated Key Exchange. Contributions to IEEE P1363. March 2000. Available from http://grouper.ieee.org/groups/1363/.
    • (2000) Contributions to IEEE P , vol.1363
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0027726717 scopus 로고
    • Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols
    • ACM Press, New York
    • M. Bellare and P. Rogaway. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols. In Proc. of the 1st CCS, pages 62-73. ACM Press, New York, 1993.
    • (1993) Proc. of the 1st CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks
    • IEEE
    • S. M. Bellovin and M. Merritt. Encrypted Key Exchange: Password-Based Protocols Secure against Dictionary Attacks. In Proc. of the Symposium on Security and Privacy, pages 72-84. IEEE, 1992.
    • (1992) Proc. of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 0027741529 scopus 로고
    • Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise
    • ACM Press, New York
    • S. M. Bellovin and M. Merritt. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. In Proc. of the 1st CCS, pages 244-250. ACM Press, New York, 1993.
    • (1993) Proc. of the 1st CCS , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 7
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman
    • Springer-Verlag, Berlin
    • V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman. In Eurocrypt '00, LNCS 1807, pages 156-171. Springer-Verlag, Berlin, 2000. Final version available at: http://cm.bell-labs.com/who/philmac/research/.
    • (2000) Eurocrypt '00, LNCS , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 8
    • 18744393738 scopus 로고    scopus 로고
    • Security Proofs for Efficient Password-Based Key Exchange
    • New York, 2003. The full version is available on the Cryptology ePrint Archive
    • E. Bresson, O. Chevassut, and D. Pointcheval. Security Proofs for Efficient Password-Based Key Exchange. In Proc. of the 10th CCS. ACM Press, New York, 2003. The full version is available on the Cryptology ePrint Archive 2002/192.
    • (2002) Proc. of the 10th CCS. ACM Press , vol.192
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 9
    • 35048874665 scopus 로고    scopus 로고
    • New Security Results on Encrypted Key Exchange
    • Springer-Verlag, Berlin
    • E. Bresson, O. Chevassut, and D. Pointcheval. New Security Results on Encrypted Key Exchange. In PKC '04, LNCS. Springer-Verlag, Berlin, 2004. Full version available at: http://www.di.ens.fr/users/pointche/.
    • (2004) PKC '04, LNCS.
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 35248835679 scopus 로고    scopus 로고
    • On Memory-Bound Functions for Fighting Spam
    • Springer-Verlag, Berlin
    • C. Dwork, A. Goldberg, and M. Naor. On Memory-Bound Functions for Fighting Spam. In Crypto '03, LNCS 2729, pages 426-444. Springer-Verlag, Berlin, 2003.
    • (2003) Crypto '03, LNCS , vol.2729 , pp. 426-444
    • Dwork, C.1    Goldberg, A.2    Naor, M.3
  • 12
    • 84861587712 scopus 로고    scopus 로고
    • Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks
    • A. Juels and J. Brainard. Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks. In Proc. of NDSS '99, pages 151-165, 1999.
    • (1999) Proc. of NDSS '99 , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 13
    • 0023984964 scopus 로고
    • How to Construct Pseudorandom Permutations from Pseudorandom Functions
    • M. Luby and Ch. Rackoff. How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM Journal of Computing, 17(2):373-386, 1988.
    • (1988) SIAM Journal of Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, Ch.2
  • 14
    • 1642489925 scopus 로고    scopus 로고
    • OAEP Reconsidered
    • September
    • V. Shoup. OAEP Reconsidered. Journal of Cryptology, 15(4):223-249, September 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.4 , pp. 223-249
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.