메뉴 건너뛰기




Volumn 3108, Issue , 2004, Pages 164-175

Cryptanatysis of two password-authenticated key exchange protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; SECURITY OF DATA;

EID: 35048901616     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-27800-9_15     Document Type: Article
Times cited : (17)

References (26)
  • 1
    • 0344205205 scopus 로고
    • Minding Your p's and q's
    • Advaces in Cryptology - ASIACRYPT'96, Springer-Verlag
    • R. Anderson and S. Vaudenay, Minding Your p's and q's, Advaces in Cryptology - ASIACRYPT'96, LNCS 963, pages 236-247, Springer-Verlag, 1995.
    • (1995) LNCS , vol.963 , pp. 236-247
    • Anderson, R.1    Vaudenay, S.2
  • 2
    • 15744393134 scopus 로고    scopus 로고
    • Security Analysis of a Password Authenticated Key Exchange Protocol
    • F. Bao, Security Analysis of a Password Authenticated Key Exchange Protocol, Proceedings of ISC 2003, 2003.
    • (2003) Proceedings of ISC 2003
    • Bao, F.1
  • 3
    • 84947913130 scopus 로고    scopus 로고
    • Generating ElGamal Signatures without Knowing the Secret
    • Advances in Cryptology - EUROCRYPT'96, Springer-Verlag
    • D. Bleichenbacher, Generating ElGamal Signatures without Knowing the Secret, Advances in Cryptology - EUROCRYPT'96, LNCS 1070, pages 10-18, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 10-18
    • Bleichenbacher, D.1
  • 5
    • 0027741529 scopus 로고
    • Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise
    • S. Bellovin and M. Merritt, Augumented Encrypted Key Exchange: A Password-based Protocol Secure Against Dictionary Attacks and Password File Compromise. Proceedings of CCS'93, pages 244-250, 1993.
    • (1993) Proceedings of CCS'93 , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 6
    • 84937550984 scopus 로고    scopus 로고
    • Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman
    • V. Boyko, P. MacKenzie, and S. Patel, Provably-secure Password Anthentiation and Key Exchange Using Diffie-Hellman. EUROCRYPT 2000, pages 156-171.
    • EUROCRYPT , vol.2000 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 7
    • 0029531472 scopus 로고
    • Optimal Authentication Protocols Resistant to Password Guessing Attacks
    • L. Gong, Optimal Authentication Protocols Resistant to Password Guessing Attacks. 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
    • (1995) 8th IEEE Computer Security Foundations Workshop , pp. 24-29
    • Gong, L.1
  • 8
    • 26844522740 scopus 로고    scopus 로고
    • EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange
    • ACISP 2003, Springer-Verlag Berlin Heidelberg 2003
    • Y. H. Hwang, D. H. Yum, and P. J. Lee, EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange, ACISP 2003, LNCS 2727, Springer-Verlag Berlin Heidelberg 2003, pages 452-463, 2003.
    • (2003) LNCS , vol.2727 , pp. 452-463
    • Hwang, Y.H.1    Yum, D.H.2    Lee, P.J.3
  • 9
    • 0030261758 scopus 로고    scopus 로고
    • Strong Password-Only Authenticated Key Exchange
    • D. Jablon, Strong Password-Only Authenticated Key Exchange, ACM Computer Communications Review, vol.26, no.5, 1996.
    • (1996) ACM Computer Communications Review , vol.26 , Issue.5
    • Jablon, D.1
  • 10
  • 11
    • 35048861091 scopus 로고    scopus 로고
    • Contribution for the P1363 standard, August
    • T. Kwon, Summary of AMP, Contribution for the P1363 standard, available at http://grouper.ieee.org/groups/1363/passwdPK/contributions/ampsummary.pdf, August 2003.
    • (2003) Summary of AMP
    • Kwon, T.1
  • 12
    • 35048882198 scopus 로고    scopus 로고
    • Contribution for the P1363 standard, November
    • T. Kwon, Addendum to Summary of AMP, Contribution for the P1363 standard, available at http://grouper.ieee.org/groups/1363/passwdPK/contributions/ ampsummary2.pdf, November 2003.
    • (2003) Addendum to Summary of AMP
    • Kwon, T.1
  • 13
    • 84958601057 scopus 로고    scopus 로고
    • A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup
    • Burton S. Kaliski Jr(Ed.), Advances in Cryptology - CRYPTO '97, Springer-Verlag
    • C. H. Lim and P. J. Lee, A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup, Burton S. Kaliski Jr(Ed.), Advances in Cryptology - CRYPTO '97, LNCS 1294, Springer-Verlag, pages 249-263, 1997.
    • (1997) LNCS , vol.1294 , pp. 249-263
    • Lim, C.H.1    Lee, P.J.2
  • 14
    • 84957025686 scopus 로고    scopus 로고
    • Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys
    • Proceedings of Security Protocols Workshop, Springer-Verlag
    • S. Lucks, Open Key Exchange: How to Defeat Dictionary Attacks Without Encrypting Public Keys, Proceedings of Security Protocols Workshop, LNCS 1361, pages 79-90, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1361 , pp. 79-90
    • Lucks, S.1
  • 15
    • 84937402236 scopus 로고    scopus 로고
    • Password-Authenticated Key Exchange Based on RSA
    • Proceedings of AsiaCrypt 2000, Springer-Verlag
    • P. MacKenzie, S. Patel, and R. Swaminathan, Password-Authenticated Key Exchange Based on RSA, Proceedings of AsiaCrypt 2000, pages 599-613, LNCS, Springer-Verlag, 2000.
    • (2000) LNCS , pp. 599-613
    • MacKenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 16
    • 33846461562 scopus 로고    scopus 로고
    • The PAK Suite: Protocols for Password-Authenticated Key Exchange
    • April
    • P. MacKenzie, The PAK Suite: Protocols for Password-Authenticated Key Exchange, Submission to IEEE P1363.2, April 2002.
    • (2002) Submission to IEEE P1363.2
    • MacKenzie, P.1
  • 17
    • 84937579448 scopus 로고    scopus 로고
    • More Efficient Password-Authenticated Key Exchange
    • P. MacKenzie, More Efficient Password-Authenticated Key Exchange, Progress in Cryptology - CT-RSA 2001, pages 361-377, 2001.
    • (2001) Progress in Cryptology - CT-RSA 2001 , pp. 361-377
    • MacKenzie, P.1
  • 18
    • 84947723778 scopus 로고    scopus 로고
    • n
    • Advances in Cryptology-ASIACRYPT'98, Spinger-Verlag
    • n, Advances in Cryptology-ASIACRYPT'98, LNCS 1514, Spinger-Verlag, 1998, pp.214-226.
    • (1998) LNCS , vol.1514 , pp. 214-226
    • Mao, W.1    Lim, C.H.2
  • 20
    • 35048831079 scopus 로고    scopus 로고
    • Attacks Based on Small Factors in Various Group Structures
    • ACISP 2001
    • C. Pavlovski and C. Boyd, Attacks Based on Small Factors in Various Group Structures, ACISP 2001, LNCS 2119, pages 36-50, 2001.
    • (2001) LNCS , vol.2119 , pp. 36-50
    • Pavlovski, C.1    Boyd, C.2
  • 21
    • 84919085619 scopus 로고
    • An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance
    • S. Pohlig and M. Hellman, An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance, IEEE Transactions on Information Theory, vol 24, no 1, pages 106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 22
    • 84966238549 scopus 로고
    • Monte Carlo Methods for Index Computation (mod p)
    • J. M.Pollard, Monte Carlo Methods for Index Computation (mod p), Math. Comp., 32(143), pages. 918-924, 1978.
    • (1978) Math. Comp. , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.M.1
  • 23
    • 1842499869 scopus 로고    scopus 로고
    • On Diffie-Hellman Key Agreement with Short Exponents
    • EUROCRYPT'96
    • P. C. van Oorschot and M. Wiener, On Diffie-Hellman Key Agreement with Short Exponents, EUROCRYPT'96 LNCS 1070, pages 332-343, 1996.
    • (1996) LNCS , vol.1070 , pp. 332-343
    • Van Oorschot, P.C.1    Wiener, M.2
  • 24
    • 84955603054 scopus 로고    scopus 로고
    • Hidden Collisions on DSS
    • Advances in Cryptology - CRYPTO'96, Springer-Verlag
    • S. Vaudenay, Hidden Collisions on DSS, Advances in Cryptology - CRYPTO'96, LNCS 1109, pages 83-88, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1109 , pp. 83-88
    • Vaudenay, S.1
  • 26
    • 84945247158 scopus 로고    scopus 로고
    • Password authenticated key exchange based on RSA for unbalanced wireless networks
    • Proceedings of ISC 2002, Springer-Verlag
    • F. Zhu, D. S. Wong, A. H. Chan, and R. Ye, Password authenticated key exchange based on RSA for unbalanced wireless networks, Proceedings of ISC 2002, LNCS 2433, pp. 150-161, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2433 , pp. 150-161
    • Zhu, F.1    Wong, D.S.2    Chan, A.H.3    Ye, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.