메뉴 건너뛰기




Volumn 3089, Issue , 2004, Pages 233-247

Password authenticated key exchange using quadratic residues

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 35048895400     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24852-1_17     Document Type: Article
Times cited : (3)

References (22)
  • 3
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • ACM, November
    • S. M. Bellovin and M. Merritt, Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise, Proc. of the 1st ACM Conference on Computer and Communications Security, ACM, November 1993, pp. 244-250.
    • (1993) Proc. of the 1st ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using Diffie-Hellman
    • Advances in Cryptology - EUROCRYPT 2000 Proceedings, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, Provably secure password authenticated key exchange using Diffie-Hellman, Advances in Cryptology - EUROCRYPT 2000 Proceedings, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, 2000, pp. 156-171.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attack
    • Advances in Cryptology - EUROCRYPT 2000 Proceedings, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated key exchange secure against dictionary attack, Advances in Cryptology - EUROCRYPT 2000 Proceedings, Lecture Notes in Computer Science, vol. 1807, Springer-Verlag, 2000, pp. 139-155.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 7
    • 84945119254 scopus 로고
    • Entity Authentication and key distribution
    • Advances in Cryptology - Crypto 93 Proceedings, Springer-Verlag
    • M. Bellare and P. Rogaway, Entity Authentication and key distribution, Advances in Cryptology - Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, Springer-Verlag, 1994, pp. 22-26.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 22-26
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 35248830706 scopus 로고    scopus 로고
    • A framework for password-based authenticated key exchange
    • Advances in Cryptology - Eurocrypt 2003 Proceedings, Springer-Verlag
    • R. Gennaro and Y. Lindell, A framework for password-based authenticated key exchange, Advances in Cryptology - Eurocrypt 2003 Proceedings, Lecture Notes in Computer Science Vol. 2656, Springer-Verlag, 2003, pp.524-542.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 524-542
    • Gennaro, R.1    Lindell, Y.2
  • 9
    • 84880888233 scopus 로고    scopus 로고
    • Session-key generation using human passwords only
    • Advances in Cryptology - Crypto 2001 Proceedings, Springer-Verlag
    • O. Goldreich and Y. Lindell, Session-key generation using human passwords only, Advances in Cryptology - Crypto 2001 Proceedings, Lecture Notes in Computer Science Vol. 2139, Springer-Verlag, 2001, pp.408-432.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 12
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, Strong password-only authenticated key exchange, Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, 1996, pp. 5-26.
    • (1996) Computer Communication Review, ACM SIGCOMM , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 13
    • 35048825481 scopus 로고    scopus 로고
    • D. Jablon, http://www.integritysciences.com.
    • Jablon, D.1
  • 14
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • Advances in Cryptology - Eurocrypt'2001 Proceedings, Springer-Verlag
    • J. Katz, R. Ostrovsky, and M. Yung, Efficient password-authenticated key exchange using human-memorable passwords, Advances in Cryptology - Eurocrypt'2001 Proceedings, Lecture Notes in Computer Science, Vol. 2045, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 15
    • 0036825859 scopus 로고    scopus 로고
    • Pretty-simple password-authenticated key-exchange under standard assumptions
    • K. Kobara and H. Imai, Pretty-simple password-authenticated key-exchange under standard assumptions, IEICE Trans., vol. E85-A, no. 10, 2002, pp. 2229-2237.
    • (2002) IEICE Trans. , vol.E85-A , Issue.10 , pp. 2229-2237
    • Kobara, K.1    Imai, H.2
  • 17
    • 84957025686 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Proc. Security Protocol Workshop, Springer-Verlag
    • S. Lucks, Open key exchange: How to defeat dictionary attacks without encrypting public keys, Proc. Security Protocol Workshop, Lecture Notes in Computer Science, Vol. 1361, Springer-Verlag, 1997, pp. 79-90.
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 18
    • 84937402236 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • Advances in Cryptology-ASIACRYPT 2000 Proceedings, Springer-Verlag
    • P. MacKenzie, S. Patel, and R. Swaminathan, Password-authenticated key exchange based on RSA, Advances in Cryptology-ASIACRYPT 2000 Proceedings, Lecture Notes in Computer Science, vol. 1976, Springer-Verlag, 2000, pp. 599-613.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.