메뉴 건너뛰기




Volumn 2727 LNCS, Issue , 2003, Pages 166-179

Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION AREAS; BUILDING BLOCKS; EXISTING BUILDINGS; IDEAL MODELS; KEY EXCHANGE PROTOCOLS; KEY EXCHANGES; NEW PROTOCOLS; PRACTICAL USE; PROVABLY SECURE; SECURITY PROOFS; WIRELESS PROTOCOLS; APPLICATION AREA; BUILDING BLOCKES; NEW PROTOCOL; SECURE KEY EXCHANGES; WIRELESS PROTOCOL;

EID: 63449093784     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45067-X_15     Document Type: Conference Paper
Times cited : (17)

References (17)
  • 1
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • Full version at
    • Mihir Bellare, Ran Canetti, and Hugo Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM, pages 412-428, 1998. Full version at http://www-cse.ucsd.edu/users/mihir/ papers/modular.pdf.
    • (1998) Proceedings of the 30th Annual Symposium on the Theory of Computing, ACM , pp. 412-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 84945119254 scopus 로고    scopus 로고
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto 1993, 773 of LNCS, pages 232-249. Springer-Verlag, 1994. Full version at http://www-cse.ucsd.edu/users/mihir/papers/eakd.pdf.
    • Mihir Bellare and Phillip Rogaway. Entity authentication and key distribution. In Advances in Cryptology - Crypto 1993, volume 773 of LNCS, pages 232-249. Springer-Verlag, 1994. Full version at http://www-cse.ucsd.edu/users/mihir/papers/eakd.pdf.
  • 5
    • 84956866842 scopus 로고    scopus 로고
    • Unknown key-share attacks on the station-to-station (sts) protocol
    • Public Key Cryptography 1999, of, Springer-Verlag
    • Simon Blake-Wilson and Alfred Menezes. Unknown key-share attacks on the station-to-station (sts) protocol. In Public Key Cryptography 1999, volume 1560 of LNCS, pages 154-170. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1560 , pp. 154-170
    • Blake-Wilson, S.1    Menezes, A.2
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, 2045 of LNCS, pages 453-474. Springer-Verlag, 2001. Full version at http://eprint.iacr.org/2001/040.ps.
    • Ran Canetti and Hugo Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS, pages 453-474. Springer-Verlag, 2001. Full version at http://eprint.iacr.org/2001/040.ps.
  • 10
    • 0036505541 scopus 로고    scopus 로고
    • Authentication protocols for mobile network environment value-added services
    • Günther Horn, Keith M. Martin, and Chris J. Mitchell. Authentication protocols for mobile network environment value-added services. IEEE Transactions on Vechicular Technology, 51(2):383-392, 2002.
    • (2002) IEEE Transactions on Vechicular Technology , vol.51 , Issue.2 , pp. 383-392
    • Horn, G.1    Martin, K.M.2    Mitchell, C.J.3
  • 11
    • 84958780603 scopus 로고    scopus 로고
    • Authentication and payment in future mobile systems
    • European Symposium on Research in Computer Security ESORICS, of, Springer-Verlag
    • Günther Horn and Bart Preneel. Authentication and payment in future mobile systems. In European Symposium on Research in Computer Security (ESORICS), volume 1485 of LNCS, pages 277-293. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1485 , pp. 277-293
    • Horn, G.1    Preneel, B.2
  • 12
    • 84949186835 scopus 로고    scopus 로고
    • Mutual authentication for low-power mobile devices
    • Proceedings of Financial Cryptography 2001, of, Springer-Verlag
    • Markus Jakobsson and David Pointcheval. Mutual authentication for low-power mobile devices. In Proceedings of Financial Cryptography 2001, volume 2339 of LNCS, pages 178-195. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2339 , pp. 178-195
    • Jakobsson, M.1    Pointcheval, D.2
  • 13
    • 84937389342 scopus 로고    scopus 로고
    • The gap-problems: A new class of problems for the security of cryptographic schemes
    • Public Key Cryptography 2001, of, Springer-Verlag, February
    • Tatsuaki Okamoto and David Pointcheval. The gap-problems: a new class of problems for the security of cryptographic schemes. In Public Key Cryptography 2001, volume 1992 of LNCS, pages 104-118. Springer-Verlag, February 2001.
    • (2001) LNCS , vol.1992 , pp. 104-118
    • Okamoto, T.1    Pointcheval, D.2
  • 14
    • 63449140558 scopus 로고    scopus 로고
    • A fraud detection method and its application to third generation wireless systems
    • D.-G. Park, M.-N. Oh, and M. Looi. A fraud detection method and its application to third generation wireless systems. In Proceedings of Globecom 98, pages 1984-1989, 1998.
    • (1998) Proceedings of Globecom , vol.98 , pp. 1984-1989
    • Park, D.-G.1    Oh, M.-N.2    Looi, M.3
  • 15
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Claus P. Schnorr. Efficient signature generation by smart cards. Journal of Cryptology 4, pages 161-174, 1991.
    • (1991) Journal of Cryptology , vol.4 , pp. 161-174
    • Schnorr, C.P.1
  • 16
    • 63449121396 scopus 로고    scopus 로고
    • Victor Shoup. On formal models for secure key exchange. Research Report RZ 3120, IBM Zurich Research Lab, 1999. Version 4 of 1999 revision of IBM Research Report RZ 3120 at http://www.shoup.net/papers/skey.pdf.
    • Victor Shoup. On formal models for secure key exchange. Research Report RZ 3120, IBM Zurich Research Lab, 1999. Version 4 of 1999 revision of IBM Research Report RZ 3120 at http://www.shoup.net/papers/skey.pdf.
  • 17
    • 84946838086 scopus 로고    scopus 로고
    • Efficient and mutually authenticated key exchange for low power computing devices
    • Advances in Cryptology, Asiacrypt 2001, of, Springer-Verlag
    • Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - Asiacrypt 2001, volume 2248 of LNCS, pages 272-289. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 272-289
    • Wong, D.S.1    Chan, A.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.