메뉴 건너뛰기




Volumn 4784 LNCS, Issue , 2007, Pages 1-16

Stronger security of authenticated key exchange

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; NETWORK PROTOCOLS; NUMERICAL METHODS; PROBLEM SOLVING;

EID: 38149012093     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75670-5_1     Document Type: Conference Paper
Times cited : (548)

References (17)
  • 1
    • 35048881545 scopus 로고    scopus 로고
    • The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols
    • Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
    • Bellare, M., Palacio, A.: The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273-289. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 273-289
    • Bellare, M.1    Palacio, A.2
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Against Dictionary Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110-125. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 110-125
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and their Security Analysis
    • Darnell, M, ed, Cryptography and Coding, Springer, Heidelberg
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 8
    • 33646779184 scopus 로고    scopus 로고
    • Errors in Computational Complexity Proofs for Protocols
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Choo, K-K.R., Boyd, C., Hitchcock, Y.: Errors in Computational Complexity Proofs for Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 624-643. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 624-643
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 9
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability- Based Proof Models for Key Establishment Protocols
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 10
    • 34548765558 scopus 로고    scopus 로고
    • A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal, Oxford University; also available at Cryptology ePrint Archive
    • Report 2007/188 to appear
    • Choo, K.-K.R.: A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal, Oxford University; also available at Cryptology ePrint Archive: Report 2007/188 (to appear, 2007)
    • (2007)
    • Choo, K.-K.R.1
  • 11
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 12
    • 33745179557 scopus 로고    scopus 로고
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 546-566. Springer, Heidelberg (2005)
    • Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546-566. Springer, Heidelberg (2005)
  • 13
    • 35048878818 scopus 로고    scopus 로고
    • Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, 3089, Springer, Heidelberg (2004)
    • Jeong, I.R., Katz, J., Lee, D.H.: One-Round Protocols for Two-Party Authenticated Key Exchange. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004, LNCS, vol. 3089, Springer, Heidelberg (2004)
  • 14
    • 33646756559 scopus 로고    scopus 로고
    • Modular Security Proofs for Key Agreement Protocols
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Kudla, C., Paterson, K.G.: Modular Security Proofs for Key Agreement Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549-565. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 549-565
    • Kudla, C.1    Paterson, K.G.2
  • 15
    • 33745816645 scopus 로고    scopus 로고
    • Lauter, K., Mityagin, A.: Security Analysis of KEA Authenticated Key Exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, 3958, pp. 378-394. Springer, Heidelberg (2006)
    • Lauter, K., Mityagin, A.: Security Analysis of KEA Authenticated Key Exchange. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 378-394. Springer, Heidelberg (2006)
  • 17
    • 84937389342 scopus 로고    scopus 로고
    • Okamoto, T., Pointcheval, D.: The Gap Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, 1992, pp. 104-118. Springer, Heidelberg (2001)
    • Okamoto, T., Pointcheval, D.: The Gap Problems: A New Class of Problems for the Security of Cryptographic Schemes. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104-118. Springer, Heidelberg (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.