메뉴 건너뛰기




Volumn 2729, Issue , 2003, Pages 400-425

SIGMA: The 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the IKE protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DESIGN; ECONOMIC AND SOCIAL EFFECTS; NETWORK SECURITY;

EID: 35248816546     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45146-4_24     Document Type: Article
Times cited : (254)

References (34)
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology, - CRYPTO'93, D. Stinson ed, Springer-Verlag
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution", Advances in Cryptology, - CRYPTO'93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232-249.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84956866842 scopus 로고    scopus 로고
    • Unknown key-share attacks on the station-to-station (STS) protocol
    • Proceedings of PKC '99
    • S. Blake-Wilson and A. Menezes, "Unknown key-share attacks on the station-to-station (STS) protocol", Proceedings of PKC '99, Lecture Notes in Computer Science, 1560 (1999), 154-170.
    • (1999) Lecture Notes in Computer Science , vol.1560 , pp. 154-170
    • Blake-Wilson, S.1    Menezes, A.2
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Eurocrypt'2001
    • Canetti, R., and Krawczyk, H., "Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels", Eurocrypt'2001, LNCS Vol. 2045.
    • LNCS , vol.2045
    • Canetti, R.1    Krawczyk, H.2
  • 7
    • 84880890468 scopus 로고    scopus 로고
    • Full version Report 2001/040
    • Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2001/040.
    • Cryptology ePrint Archive
  • 8
    • 84869635960 scopus 로고    scopus 로고
    • Security Analysis of IKE's Signature-based Key-Exchange Protocol
    • Crypto 2002
    • Canetti, R., and Krawczyk, H., "Security Analysis of IKE's Signature-based Key-Exchange Protocol", Crypto 2002. LNCS Vol. 2442.
    • LNCS , vol.2442
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 84880890468 scopus 로고    scopus 로고
    • Full version Report 2002/120
    • Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2002/120.
    • Cryptology ePrint Archive
  • 13
    • 0004115841 scopus 로고    scopus 로고
    • D. Harkins and D. Carrel, ed., RFC 2409, Nov.
    • D. Harkins and D. Carrel, ed., "The Internet Key Exchange (IKE)", RFC 2409, Nov. 1998.
    • (1998) The Internet Key Exchange (IKE)
  • 15
    • 84945137421 scopus 로고    scopus 로고
    • Encryption Modes with Almost Free Message Integrity
    • Advances in Cryptology - EUROCRYPT 2001 Proceedings, Springer-Verlag, B. Pfitzmann, ed
    • C. Jutla, "Encryption Modes with Almost Free Message Integrity", Advances in Cryptology - EUROCRYPT 2001 Proceedings, Lecture Notes in Computer Science, Vol. 2045, Springer-Verlag, B. Pfitzmann, ed, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045
    • Jutla, C.1
  • 18
    • 1442292341 scopus 로고    scopus 로고
    • draft-ietf-ipsec-ikev2-07.txt, April (to be published as an RFC)
    • C. Kaufman, "Internet Key Exchange (IKEv2) Protocol", draft-ietf-ipsec-ikev2-07.txt, April 2003 (to be published as an RFC).
    • (2003) Internet Key Exchange (IKEv2) Protocol
    • Kaufman, C.1
  • 19
    • 0003068282 scopus 로고    scopus 로고
    • Security Architecture for the Internet Protocol
    • Nov.
    • S. Kent and R. Atkinson, "Security Architecture for the Internet Protocol", Request for Comments 2401, Nov. 1998.
    • (1998) Request for Comments 2401
    • Kent, S.1    Atkinson, R.2
  • 21
    • 84943289804 scopus 로고
    • Communication to IPsec WG
    • April-October
    • H. Krawczyk, Communication to IPsec WG, IPsec mailing list archives, April-October 1995. http://www.vpnc.org/ietf-ipsec/
    • (1995) IPsec Mailing List Archives
    • Krawczyk, H.1
  • 23
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-Hashing for Message Authentication
    • February
    • Krawczyk, H., Bellare, M., and Canetti, R., "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
    • (1997) RFC 2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 24
    • 33645401426 scopus 로고    scopus 로고
    • Blinding of Credit Card Numbers in the SET Protocol
    • Proceedings of Financial Cryptography'99
    • Krawczyk, H., "Blinding of Credit Card Numbers in the SET Protocol", Proceedings of Financial Cryptography'99, LNCS Vol. 1648, 1999.
    • (1999) LNCS , vol.1648
    • Krawczyk, H.1
  • 25
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (Or: How secure is SSL?)
    • Crypto'2001
    • H. Krawczyk, "The order of encryption and authentication for protecting communications (Or: how secure is SSL?)", Crypto'2001, LNCS Vol. 2139.
    • LNCS , vol.2139
    • Krawczyk, H.1
  • 26
    • 84880890468 scopus 로고    scopus 로고
    • Full version Report 2001/045
    • Full version in: Cryptology ePrint Archive (http://eprint.iacr.org/), Report 2001/045.
    • Cryptology ePrint Archive
  • 29
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer
    • IEEE Computer Society Press
    • Meadows, C., "Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer", Proc. of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1999.
    • (1999) Proc. of the 1999 IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 31
    • 0003294637 scopus 로고    scopus 로고
    • The OAKLEY Key Determination Protocol
    • Nov.
    • Orman, H., "The OAKLEY Key Determination Protocol", Request for Comments 2412, Nov. 1998.
    • (1998) Request for Comments 2412
    • Orman, H.1
  • 33
    • 0004023090 scopus 로고    scopus 로고
    • On Formal Models for Secure Key Exchange
    • V. Shoup, "On Formal Models for Secure Key Exchange", Theory of Cryptography Library, 1999. Available at: http://philby.ucsd.edu/cryptolib/1999/99-12.html.
    • (1999) Theory of Cryptography Library
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.