메뉴 건너뛰기




Volumn 2332, Issue , 2002, Pages 321-336

Dynamic group diffie-hellman key exchange under standard assumptions

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 50849092893     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46035-7_21     Document Type: Conference Paper
Times cited : (206)

References (29)
  • 1
    • 0032218234 scopus 로고    scopus 로고
    • Authenticated group key agreement and friends
    • G. Ateniese, M. Steiner, and G. Tsudik. Authenticated group key agreement and friends. In ACM CCS ’98, pp. 17–26. 1998.
    • (1998) ACM CCS ’98 , pp. 17-26
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 2
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • LNCS 1109, Springer
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Proc. of Crypto ’96, LNCS 1109, pp. 1–15. Springer, 1996.
    • (1996) Proc of Crypto ’96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • LNCS 1807, Springer
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. of Eurocrypt ’00, LNCS 1807, pp. 139–155. Springer, 2000.
    • (2000) Proc of Eurocrypt ’00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. In ACM CCS ’93, pp. 62–73. 1993.
    • (1993) ACM CCS ’93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0000539625 scopus 로고    scopus 로고
    • A review experience with reliable multicast
    • K. P. Birman. A review experience with reliable multicast. Software – Practice and Experience, 29(9):741–774, 1999.
    • (1999) Software – Practice and Experience , vol.29 , Issue.9 , pp. 741-774
    • Birman, K.P.1
  • 6
    • 84947778144 scopus 로고    scopus 로고
    • The decision Diffie-Hellman problem
    • LNCS 1423, Springer
    • D. Boneh. The decision Diffie-Hellman problem. In Proc. of ANTS III, LNCS 1423, pp. 48–63. Springer, 1998.
    • (1998) Proc of ANTS III , pp. 48-63
    • Boneh, D.1
  • 8
    • 50849127145 scopus 로고    scopus 로고
    • Provably authenticated group Diffie-Hellman key exchange – the dynamic case
    • LNCS 2248, Springer
    • E. Bresson, O. Chevassut, and D. Pointcheval. Provably authenticated group Diffie-Hellman key exchange – the dynamic case. In Proc. of Asiacrypt ’01, LNCS 2248, pp. 290–309. Springer, 2001.
    • (2001) Proc of Asiacrypt ’01 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 9
    • 50849092893 scopus 로고    scopus 로고
    • Dynamic group Diffie-Hellman key exchange under standard assumptions
    • LNCS. Springer, Full version of this paper available at
    • E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic group Diffie-Hellman key exchange under standard assumptions. In Proc. of Eurocrypt ’02, LNCS. Springer, 2002. Full version of this paper available at http://www.di.ens.fr/∼pointche.
    • (2002) Proc of Eurocrypt ’02
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 10
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • LNCS 950, Springer
    • M. Burmester and Y. G. Desmedt. A secure and efficient conference key distribution system. In Proc. of Eurocrypt ’94, LNCS 950, pp. 275–286. Springer, 1995.
    • (1995) Proc of Eurocrypt ’94 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.G.2
  • 11
    • 0001776520 scopus 로고    scopus 로고
    • Group communication specifications: A comprehensive study
    • G. V. Chockler, I. Keidar, and R. Vitenberg. Group communication specifications: A comprehensive study. ACM Computing Surveys, 33(4):1–43, 2001.
    • (2001) ACM Computing Surveys , vol.33 , Issue.4 , pp. 1-43
    • Chockler, G.V.1    Keidar, I.2    Vitenberg, R.3
  • 16
    • 84969368443 scopus 로고
    • An identity-based key exchange protocol
    • LNCS 434, Springer
    • C. G. Gunter. An identity-based key exchange protocol. In Proc. of Eurocrypt ’89, LNCS 434, pp. 29–37. Springer, 1989.
    • (1989) Proc of Eurocrypt ’89 , pp. 29-37
    • Gunter, C.G.1
  • 18
    • 0030709604 scopus 로고    scopus 로고
    • On the importance of securing your bins: The garbage-man-in-the-middle attack
    • M. Joye and J.-J. Quisquater. On the importance of securing your bins: The garbage-man-in-the-middle attack. In ACM CCS’97, pp. 135–141. 1997.
    • (1997) ACM CCS’97 , pp. 135-141
    • Joye, M.1    Quisquater, J.-J.2
  • 19
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated multi-party key agreement
    • LNCS 1163, Springer
    • M. Just and S. Vaudenay. Authenticated multi-party key agreement. In Proc. Of Asiacrypt ’96, LNCS 1163, pp. 36–49. Springer, 1996.
    • (1996) Proc of Asiacrypt ’96 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 20
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudorandom functions
    • IEEE
    • M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudorandom functions. In FOCS ’97, pp. 458–467. IEEE, 1997.
    • (1997) FOCS ’97 , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 21
    • 0003584029 scopus 로고
    • NIST. FIPS 140-1, U. S. N ational Institute of Standards and Technology
    • NIST. FIPS 140-1: Security Requirements for Cryptographic Modules. U. S. N ational Institute of Standards and Technology, 1994.
    • (1994) Security Requirements for Cryptographic Modules
  • 22
    • 84958045366 scopus 로고    scopus 로고
    • Using a high-performance, programmable secure coprocessor
    • LNCS 1465, Springer
    • E. R. Palmer, S. W. Smith, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Financial Crypto ’98, LNCS 1465, pp. 73–89. Springer, 1998.
    • (1998) Financial Crypto ’98 , pp. 73-89
    • Palmer, E.R.1    Smith, S.W.2    Weingart, S.3
  • 23
    • 84947904235 scopus 로고    scopus 로고
    • Session-key disribution using smart cards
    • LNCS 1070, Springer
    • A. Rubin and V. Shoup. Session-key disribution using smart cards. In Proc. Of Eurocrypt ’96, LNCS 1070, pp. 321–331. Springer, 1996.
    • (1996) Proc of Eurocrypt ’96 , pp. 321-331
    • Rubin, A.1    Shoup, V.2
  • 25
    • 84880904783 scopus 로고    scopus 로고
    • OAEP reconsidered
    • J. Kilian, editor, Springer-Verlag
    • V. Shoup. OAEP reconsidered. In J. Kilian, editor, Proc. of Cryto’ 01, volume 2139 of LNCS, pages 239–259. Springer-Verlag, 2001.
    • (2001) Proc of Cryto’ 01, Volume 2139 of LNCS , pp. 239-259
    • Shoup, V.1
  • 26
    • 0029720059 scopus 로고    scopus 로고
    • Diffie-Hellman key distribution extended to group communication
    • M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman key distribution extended to group communication. In ACM CCS ’96, pp. 31–37. 1996.
    • (1996) ACM CCS ’96 , pp. 31-37
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 27
    • 84957807365 scopus 로고    scopus 로고
    • A practical and secure fault-tolerant conference-key agreement protocol
    • LNCS 1751, Springer
    • W. G. Tzeng. A practical and secure fault-tolerant conference-key agreement protocol. In Proc. of PKC ’00, LNCS 1751, pp. 1–13. Springer, 2000.
    • (2000) Proc of PKC ’00 , pp. 1-13
    • Tzeng, W.G.1
  • 29
    • 68549104046 scopus 로고    scopus 로고
    • Physical security devices for computer subsystems: A survey of attacks and defenses
    • LNCS 1965, Springer
    • S. H. Weingart. Physical security devices for computer subsystems: A survey of attacks and defenses. In Proc. of CHES ’00, LNCS 1965, pp. 302–317. Springer, 2000.
    • (2000) Proc of CHES ’00 , pp. 302-317
    • Weingart, S.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.