메뉴 건너뛰기




Volumn , Issue , 2009, Pages 781-783

Improved analysis on Chang and Chang password key exchange protocol

Author keywords

Chang Chang password key exchange protocol; The enhanced protocol; Undetectable online password guessing attack

Indexed keywords

KEY EXCHANGE PROTOCOLS; LOW ENTROPY; MESSAGE TRANSMISSIONS; PASSWORD GUESSING ATTACK; PERFORMANCE EFFICIENCY; THREE-PARTY;

EID: 77949279707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACT.2009.197     Document Type: Conference Paper
Times cited : (2)

References (10)
  • 2
    • 0002805220 scopus 로고
    • Undetectable Online password guessing attacks
    • Y. Ding and P. Hoster, "Undetectable Online password guessing attacks", ACM operatinf system review, vol 29, no 4,pp 77-86 (1995)
    • (1995) ACM operatinf system review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Hoster, P.2
  • 4
    • 0002839106 scopus 로고
    • Refinement and extention of encrypted key exchange
    • M. Steiner and G. Tsudik, M. Waidner "Refinement and extention of encrypted key exchange", ACM Operating Systems Review, vol 29, no 3, pp 22-30, ( 1995).
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 5
    • 0035701459 scopus 로고    scopus 로고
    • Three-party excrypted key exchange without server public Keys
    • CL. Lin, HM. Sun, M. Steiner, T. Hwang " Three-party excrypted key exchange without server public Keys" IEEE Communication letters, vol 5, no.12,pp 497- 9 , (2001).
    • (2001) IEEE Communication letters , vol.5 , Issue.12 , pp. 497-499
    • Lin, C.L.1    Sun, H.M.2    Steiner, M.3    Hwang, T.4
  • 6
    • 2342566530 scopus 로고    scopus 로고
    • A novel three party encrypted key exchange protocol
    • CC. Chang and YF. Chang, "A novel three party encrypted key exchange protocol", Computer Standards and Interfaces, vol 26 , no 5, (pp 471-6),(2004).
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 471-476
    • Chang, C.C.1    Chang, Y.F.2
  • 7
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • EJ. Yoon and KY. Yoo, "Improving the novel three-party encrypted key exchange protocol", Computer Standards and Interfaces, 30:309-314 , (2008).
    • (2008) Computer Standards and Interfaces , vol.30 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2
  • 8
    • 77949282945 scopus 로고    scopus 로고
    • N.W.Lo,Kuo-Hui Yeh, Cryptanalysis of two three-party Encrypted key exchange protocols, In press, computer standards and interfaces.
    • N.W.Lo,Kuo-Hui Yeh, "Cryptanalysis of two three-party Encrypted key exchange protocols", In press, computer standards and interfaces.
  • 9
    • 73849097524 scopus 로고    scopus 로고
    • Methods to solve Discrete Logarithm problem for Ephemeral Keys
    • R.Padmavathy and Chakravarthy Bhagavati, "Methods to solve Discrete Logarithm problem for Ephemeral Keys" ARTCOM, (2009).
    • (2009) ARTCOM
    • Padmavathy, R.1    Bhagavati, C.2
  • 10
    • 73849114352 scopus 로고    scopus 로고
    • Improvement on a Trap door Hash Function
    • Fuw-Yi Yang, Improvement on a Trap door Hash Function, International Journal on Network Security, Vol 9, No 1, pp 17-21,(2009).
    • (2009) International Journal on Network Security , vol.9 , Issue.1 , pp. 17-21
    • Yang, F.-Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.