메뉴 건너뛰기




Volumn , Issue , 2000, Pages

Secure Password-Based Cipher Suite for TLS

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; NETWORK SECURITY; SEEBECK EFFECT;

EID: 47349130323     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (38)
  • 1
    • 0028446389 scopus 로고
    • Fortifying key negotiation schemes with poorly chosen passwords
    • June
    • R. J. Anderson and T. M. A. Lomas. Fortifying key negotiation schemes with poorly chosen passwords. Electronics Letters, 30(13):1040-1041, June 1994.
    • (1994) Electronics Letters , vol.30 , Issue.13 , pp. 1040-1041
    • Anderson, R. J.1    Lomas, T. M. A.2
  • 5
    • 35048823135 scopus 로고    scopus 로고
    • Random oracles are practical: A pardigm for designing efficient protocols
    • Ashby [2]. also appeared (in identical form) as IBM RC 19619 (87000) 6/22/94
    • M. Bellare and P. Rogaway. Random oracles are practical: A pardigm for designing efficient protocols. In Ashby [2]. also appeared (in identical form) as IBM RC 19619 (87000) 6/22/94.
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 84948986458 scopus 로고
    • Optimal asymmetric encryption - how to encrypt with RSA
    • I. Damgard, editor, pages Springer-Verlag, Berlin Germany, Final (revised) version appeared November 19, 1995
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption - how to encrypt with RSA. In I. Damgard, editor, Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science, pages 92-111. Springer-Verlag, Berlin Germany, 1994. Final (revised) version appeared November 19, 1995.
    • (1994) Advances in Cryptology - EUROCRYPT '94, Lecture Notes in Computer Science , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 85180785462 scopus 로고    scopus 로고
    • Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise
    • S. Bellovin and M. Merrit. Augmented encrypted key exchange: a password-based protocol secure against dictionary atttacks and password file compromise. In Ashby [2], pages 244-250.
    • Ashby , Issue.2 , pp. 244-250
    • Bellovin, S.1    Merrit, M.2
  • 9
    • 0011716691 scopus 로고
    • Limitations of the Kerberos authentication system
    • Dallas, TX, Winter USENIX. An earlier version of this paper was published in the October, 1990 of Computer Communications Review
    • S. M. Bellovin and M. Merritt. Limitations of the Kerberos authentication system. In USENIX Conference Proceedings, pages 253-267, Dallas, TX, Winter 1991. USENIX. An earlier version of this paper was published in the October, 1990 issue of Computer Communications Review.
    • (1991) USENIX Conference Proceedings , pp. 253-267
    • Bellovin, S. M.1    Merritt, M.2
  • 11
    • 0029238493 scopus 로고
    • Improving system security via proactive password checking
    • M. Bishop and D. V. Klein. Improving system security via proactive password checking. Computers & Security, 14(3):233-249, 1995.
    • (1995) Computers & Security , vol.14 , Issue.3 , pp. 233-249
    • Bishop, M.1    Klein, D. V.2
  • 12
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs
    • H. Krawczyk, editor, pages Springer-Verlag, Berlin Germany, Aug
    • D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the rsa encryption standard pkcs. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, number 1462 in Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, Berlin Germany, Aug. 1998.
    • (1998) Advances in Cryptology - CRYPTO '98, number 1462 in Lecture Notes in Computer Science , pp. 1-12
    • Bleichenbacher, D.1
  • 18
    • 0032218224 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • San Francisco, California, Nov. ACM Press. Revised version available as Theory of Cryptography Library: Record 99-04
    • S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. In 5th ACM Conference on Computer and Communications Security, San Francisco, California, Nov. 1998. ACM Press. Revised version available as Theory of Cryptography Library: Record 99-04.
    • (1998) 5th ACM Conference on Computer and Communications Security
    • Halevi, S.1    Krawczyk, H.2
  • 19
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • Sep
    • D. P. Jablon. Strong password-only authenticated key exchange. Computer Communication Review, 26(5):5-26, Sep 1996.
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D. P.1
  • 21
    • 0038126042 scopus 로고    scopus 로고
    • Technical report, RSA Laboratories, Sept. Version 2.0. Published in October 1998 as Internet RFC 2437
    • B. Kaliski and J. Staddon. PKCS #1: RSA cryptography specifications. Technical report, RSA Laboratories, Sept. 1998. Version 2.0. Published in October 1998 as Internet RFC 2437.
    • (1998) PKCS #1: RSA cryptography specifications
    • Kaliski, B.1    Staddon, J.2
  • 23
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • B. S. K. Jr., editor, pages Springer-Verlag, Berlin Germany, Aug
    • C. H. Lim and P. J. Lee. A key recovery attack on discrete log-based schemes using a prime order subgroup. In B. S. K. Jr., editor, Advances in Cryptology - CRYPTO '97, number 1294 in Lecture Notes in Computer Science, pages 249-263. Springer-Verlag, Berlin Germany, Aug. 1997.
    • (1997) Advances in Cryptology - CRYPTO '97, number 1294 in Lecture Notes in Computer Science , pp. 249-263
    • Lim, C. H.1    Lee, P. J.2
  • 24
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • Ecole Normale Suprieure, Paris, Apr
    • S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Security Protocol Workshop'97, Ecole Normale Suprieure, Paris, Apr. 1997.
    • (1997) Security Protocol Workshop'97
    • Lucks, S.1
  • 25
    • 0029325653 scopus 로고
    • Fast generation of prime numbers and secure public-key cryptographic parameters
    • U. M. Maurer. Fast generation of prime numbers and secure public-key cryptographic parameters. Journal of Cryptology, 8(3):123-155, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.3 , pp. 123-155
    • Maurer, U. M.1
  • 26
    • 85180738523 scopus 로고    scopus 로고
    • Addition of kerberos cipher suites to transport layer security (TLS)
    • Aug. Expires January 22, 2000
    • A. Medvinsky and M. Hur. Addition of kerberos cipher suites to transport layer security (TLS). Internet Draft, Aug. 1999. Expires January 22, 2000.
    • (1999) Internet Draft
    • Medvinsky, A.1    Hur, M.2
  • 29
    • 0018543411 scopus 로고
    • Password security: A case history
    • Nov
    • R. Morris and K. Thompson. Password security: A case history. Commun. ACM, 22(11), Nov. 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11
    • Morris, R.1    Thompson, K.2
  • 31
    • 85180787075 scopus 로고    scopus 로고
    • RSA. Technical report, RSA Laboratories, Feb. Version 2.0; Third Draft
    • RSA. PKCS #5: Password-based encryption standard. Technical report, RSA Laboratories, Feb. 1999. Version 2.0; Third Draft.
    • (1999) PKCS #5: Password-based encryption standard
  • 32
    • 33645607716 scopus 로고    scopus 로고
    • Why chosen ciphertext security matters
    • Research Report RZ 3076 (#93122), IBM Research, Nov
    • V. Shoup. Why chosen ciphertext security matters. Research Report RZ 3076 (#93122), IBM Research, Nov. 1998.
    • (1998)
    • Shoup, V.1
  • 33
    • 0004023090 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • Research Report RZ 3120 (#93166), IBM Research, Apr
    • V. Shoup. On formal models for secure key exchange. Research Report RZ 3120 (#93166), IBM Research, Apr. 1999.
    • (1999)
    • Shoup, V.1
  • 34
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • July
    • M. Steiner, G. Tsudik, and M. Waidner. Refinement and extension of encrypted key exchange. ACM Operating Systems Review, 29(3):22-30, July 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 36
    • 85180527787 scopus 로고    scopus 로고
    • The secure remote password protocol
    • San Diego, California, Mar. Internet Society
    • T. Wu. The secure remote password protocol. In Symposium on Network and Distributed Systems Security (NDSS '98), pages 97-111, San Diego, California, Mar. 1998. Internet Society.
    • (1998) Symposium on Network and Distributed Systems Security (NDSS '98) , pp. 97-111
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.