메뉴 건너뛰기




Volumn 24, Issue 4, 2011, Pages 532-542

Cryptanalysis of a simple three-party password-based key exchange protocol

Author keywords

authentication; cryptography; key exchange; password; protocol; three party

Indexed keywords

AUTHENTICATED KEY EXCHANGE; KEY EXCHANGE; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD; PASSWORD GUESSING ATTACK; PASSWORD-BASED KEY EXCHANGE; PROTOCOL; PUBLIC KEYS; PUBLIC NETWORKS; SECURE COMMUNICATIONS; THREE-PARTY; TRANSACTION CONFIDENTIALITY; VARIOUS ATTACKS;

EID: 79953304485     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.1168     Document Type: Article
Times cited : (53)

References (17)
  • 1
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • Bellovin SM, Merritt M,. Encrypted key exchange: password-based protocols secure against dictionary attacks. Proceedings of 1992 EEE Symposium on Research in Security and Privacy. Lecture Notes in Computer Science. Springer: Berlin, 1992; 72-84. (Pubitemid 23569189)
    • (1992) Proceedings of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin Steven, M.1    Merritt Michael2
  • 2
    • 0008145442 scopus 로고    scopus 로고
    • Three-party encrypted key exchange: Attacks and a solution
    • Lin CL, Sun HM, Hwang T,. Three-party encrypted key exchange: attacks and a solution. ACM Operating Systems Review 2000; 34: 12-20.
    • (2000) ACM Operating Systems Review , vol.34 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 3
    • 2342566530 scopus 로고    scopus 로고
    • A novel three-party encrypted key exchange protocol
    • Chang CC, Chang YF,. A novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 2004; 26 (5): 472-476.
    • (2004) Computer Standards and Interfaces , vol.26 , Issue.5 , pp. 472-476
    • Chang, C.C.1    Chang, Y.F.2
  • 4
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • Lee TF, Hwang T, Lin CL,. Enhanced three-party encrypted key exchange without server public keys. Computer and Security 2004; 23 (7): 571-577.
    • (2004) Computer and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 5
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • Lee SW, Kim HS, Yoo KY,. Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 2005; 167 (2): 996-1003.
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.W.1    Kim, H.S.2    Yoo, K.Y.3
  • 6
    • 9544230689 scopus 로고    scopus 로고
    • Secure key agreement protocols for three-party against guessing attacks
    • Sun HM, Chen BC, Hwang T,. Secure key agreement protocols for three-party against guessing attacks. Journal of Systems and Software 2005; 75: 63-68.
    • (2005) Journal of Systems and Software , vol.75 , pp. 63-68
    • Sun, H.M.1    Chen, B.C.2    Hwang, T.3
  • 7
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu RX, Cao ZF,. Simple three-party key exchange protocol. Computers and Security 2007; 26: 94-97.
    • (2007) Computers and Security , vol.26 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 8
    • 42949161502 scopus 로고    scopus 로고
    • Improving the novel three-party encrypted key exchange protocol
    • Yoon EJ, Yoo KY,. Improving the novel three-party encrypted key exchange protocol. Computer Standards and Interfaces 2008; 30 (5): 309-314.
    • (2008) Computer Standards and Interfaces , vol.30 , Issue.5 , pp. 309-314
    • Yoon, E.J.1    Yoo, K.Y.2
  • 9
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • Phan RCW, Yau WC, Goi BM,. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Sciences 2008; 178: 2849-2856.
    • (2008) Information Sciences , vol.178 , pp. 2849-2856
    • Phan, R.C.W.1    Yau, W.C.2    Goi, B.M.3
  • 10
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • Guo H, Li Z, Mu Y, Zhang X,. Cryptanalysis of simple three-party key exchange protocol. Computers and Security 2008; 27: 16-21.
    • (2008) Computers and Security , vol.27 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 11
    • 58049215501 scopus 로고    scopus 로고
    • Enhanced password-based simple three-party key exchange protocol
    • Kim HS, Choi JY,. Enhanced password-based simple three-party key exchange protocol. Computers and Electrical Engineering 2009; 35: 107-114.
    • (2009) Computers and Electrical Engineering , vol.35 , pp. 107-114
    • Kim, H.S.1    Choi, J.Y.2
  • 12
    • 68049147074 scopus 로고    scopus 로고
    • A simple three-party password-based key exchange protocol
    • Huang HF,. A simple three-party password-based key exchange protocol. International Journal of Communication Systems 2009; 22: 857-862.
    • (2009) International Journal of Communication Systems , vol.22 , pp. 857-862
    • Huang, H.F.1
  • 13
    • 68949161753 scopus 로고    scopus 로고
    • An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments
    • Yang JH, Chang CC,. An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Journal of Systems and Software 2009; 82 (9): 1497-1502.
    • (2009) Journal of Systems and Software , vol.82 , Issue.9 , pp. 1497-1502
    • Yang, J.H.1    Chang, C.C.2
  • 14
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Ding Y, Horster P,. Undetectable on-line password guessing attacks. ACM Operating Systems Review 1995; 29 (4): 77-86.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.