메뉴 건너뛰기




Volumn 27, Issue 1-2, 2008, Pages 16-21

Cryptanalysis of simple three-party key exchange protocol

Author keywords

Cryptanalysis; Dictionary attack; Man in the middle attack; Password authenticated key exchange; Security

Indexed keywords

COMPUTER NETWORKS; CRYPTOGRAPHY; NETWORK PROTOCOLS; PERSONAL DIGITAL ASSISTANTS; SECURITY OF DATA;

EID: 44849118543     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.03.001     Document Type: Article
Times cited : (91)

References (18)
  • 1
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • Financial Cryptography and Data Security - FC 2005 p. 341-56
    • Abdalla M., and Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. Financial Cryptography and Data Security - FC 2005. LNCS vol. 3570 (2005) p. 341-56
    • (2005) LNCS , vol.3570
    • Abdalla, M.1    Pointcheval, D.2
  • 2
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Topics in Cryptology - CT-RSA 2005, Springer-Verlag p. 191-208
    • Abdalla M., and Pointcheval D. Simple password-based encrypted key exchange protocols. Topics in Cryptology - CT-RSA 2005. LNCS (2005), Springer-Verlag p. 191-208
    • (2005) LNCS
    • Abdalla, M.1    Pointcheval, D.2
  • 3
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Public Key Cryptography - PKC 2005 p. 65-84
    • Abdalla M., Fouque P.-A., and Pointcheval D. Password-based authenticated key exchange in the three-party setting. Public Key Cryptography - PKC 2005. LNCS vol. 3386 (2005) p. 65-84
    • (2005) LNCS , vol.3386
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 5
    • 33745677007 scopus 로고    scopus 로고
    • Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol
    • Proceedings of APWeb'06
    • Byun J.W., Lee D.H., and Lim J. Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. Proceedings of APWeb'06. LNCS vol. 3841 (2006) 830-836
    • (2006) LNCS , vol.3841 , pp. 830-836
    • Byun, J.W.1    Lee, D.H.2    Lim, J.3
  • 6
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang C.C., and Chang Y.F. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 26 5 (2004) 471-476
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 7
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y., and Horster P. Undetectable on-line password guessing attacks. ACM Operating Systems Review 29 4 (1995) 77-86
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 9
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee T.F., Hwang T., and Lin C.L. Enhanced three-party encrypted key exchange without server public keys. Computers and Security 23 7 (2004) 571-577
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 10
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee S.W., Kim H.S., and Yoo K.Y. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167 2 (2005) 996-1003
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 11
    • 0008145442 scopus 로고    scopus 로고
    • Three party-encrypted key exchange: attacks and a solution
    • Lin C.L., Sun H.M., and Hwang T. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review 34 4 (2000) 12-20
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 12
    • 0035701459 scopus 로고    scopus 로고
    • Three-party encrypted key exchange without server public-keys
    • Lin C.L., Sun H.M., Steiner M., and Hwang T. Three-party encrypted key exchange without server public-keys. IEEE Communication Letters 5 12 (2001) 497-499
    • (2001) IEEE Communication Letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 13
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R.X., and Cao Z.F. Simple three-party key exchange protocol. Computers and Security 26 (2007) 94-97
    • (2007) Computers and Security , vol.26 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 14
    • 37549042706 scopus 로고    scopus 로고
    • Cryptanalysis of Two Provably Secure Cross-realm C2C-PAKE Protocols, INDOCRYPT'06
    • p. 104-17
    • Phan R.C.-W., and Goi B.-M. Cryptanalysis of Two Provably Secure Cross-realm C2C-PAKE Protocols, INDOCRYPT'06. LNCS (2006) p. 104-17
    • (2006) LNCS
    • Phan, R.C.-W.1    Goi, B.-M.2
  • 16
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun H.M., Chen B.C., and Hwang T. Secure key agreement protocols for three-party against guessing attacks. The Journal of Systems and Software 75 (2005) 63-68
    • (2005) The Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 17
    • 84971660027 scopus 로고    scopus 로고
    • Efficient and Provably Secure Generic Construction of Three-party Password-based Authenticated Key Exchange Protocols, INDOCRYPT'06
    • p. 118-32
    • Wang W.J., and Hu L. Efficient and Provably Secure Generic Construction of Three-party Password-based Authenticated Key Exchange Protocols, INDOCRYPT'06. LNCS (2006) p. 118-32
    • (2006) LNCS
    • Wang, W.J.1    Hu, L.2
  • 18
    • 33746374068 scopus 로고    scopus 로고
    • Secure Cross-Realm C2C-PAKE Protocol
    • Proceedings of ACISP'06
    • Yin Y., and Bao L. Secure Cross-Realm C2C-PAKE Protocol. Proceedings of ACISP'06. LNCS vol. 4058 (2006) 395-406
    • (2006) LNCS , vol.4058 , pp. 395-406
    • Yin, Y.1    Bao, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.