메뉴 건너뛰기




Volumn , Issue , 2011, Pages 41-50

Composition theorems without pre-established session identifiers

Author keywords

Security; Verification

Indexed keywords

COMPOSITION THEOREM; CRYPTOGRAPHIC ASSUMPTIONS; CRYPTOGRAPHIC OPERATIONS; CRYPTOGRAPHIC PROTOCOLS; DESIGN PRINCIPLES; IEEE802.11I; MODULAR DESIGNS; PUBLIC-KEY ENCRYPTION; SECURITY; SECURITY PROTOCOLS; SESSION IDENTIFIERS; SSL/TLS; SYMMETRIC ENCRYPTION;

EID: 80755168374     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046715     Document Type: Conference Paper
Times cited : (26)

References (27)
  • 1
    • 70449625225 scopus 로고    scopus 로고
    • Plaintext recovery attacks against SSH
    • IEEE Computer Society
    • M. R. Albrecht, K. G. Paterson, and G. J. Watson. Plaintext Recovery Attacks against SSH. In S&P 2009, pages 16-26. IEEE Computer Society, 2009.
    • (2009) S&P 2009 , pp. 16-26
    • Albrecht, M.R.1    Paterson, K.G.2    Watson, G.J.3
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • B. Preneel, editor Springer
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure against Dictionary Attacks. In B. Preneel, editor, EUROCRYPT 2000, volume 1807 of LNCS, pages 139-155. Springer, 2000.
    • (2000) EUROCRYPT 2000, Volume 1807 of LNCS , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. Stinson, editor Springer
    • M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. In D. Stinson, editor, CRYPTO'93, volume 773 of LNCS, pages 232-249. Springer, 1993.
    • (1993) CRYPTO'93, Volume 773 of LNCS , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • ACM
    • M. Bellare and P. Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In STOC'95, pages 57-66. ACM, 1995.
    • (1995) STOC'95 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 6
    • 35048865382 scopus 로고    scopus 로고
    • Computationally sound mechanized proofs of correspondence assertions
    • DOI 10.1109/CSF.2007.16, 4271643, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
    • B. Blanchet. Computationally Sound Mechanized Proofs of Correspondence Assertions. In CSF 2007, pages 97-111. IEEE Computer Society, 2007. (Pubitemid 47554208)
    • (2007) Proceedings - IEEE Computer Security Foundations Symposium , pp. 97-111
    • Blanchet, B.1
  • 8
    • 28144462281 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • December
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Technical Report 2000/067, Cryptology ePrint Archive, December 2005. http://eprint.iacr.org.
    • (2005) Technical Report 2000/067, Cryptology EPrint Archive
    • Canetti, R.1
  • 9
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • R. Canetti and H. Krawczyk. Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In B. Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer, 2001. (Pubitemid 33275848)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 10
    • 84869635960 scopus 로고    scopus 로고
    • Security analysis of IKE's signature-based key-exchange protocol
    • M. Yung, editor Springer
    • R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key-Exchange Protocol. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 143-161. Springer, 2002.
    • (2002) CRYPTO 2002, Volume 2442 of LNCS , pp. 143-161
    • Canetti, R.1    Krawczyk, H.2
  • 13
    • 26444442332 scopus 로고    scopus 로고
    • Security requirements for key establishment proof models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee protocols
    • Information Security and Privacy: 10th Australasian Conference, ACISP 2005. Proceedings
    • K.-K. R. Choo and Y. Hitchcock. Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In C. Boyd and J. M. G. Nieto, editors, ACISP 2005, volume 3574 of LNCS, pages 429-442. Springer, 2005. (Pubitemid 41431800)
    • (2005) Lecture Notes in Computer Science , vol.3574 , pp. 429-442
    • Choo, K.-K.R.1    Hitchcock, Y.2
  • 14
    • 33947704230 scopus 로고    scopus 로고
    • Computationally sound compositional logic for key exchange protocols
    • DOI 10.1109/CSFW.2006.9, 1648728, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • A. Datta, A. Derek, J. C. Mitchell, and B. Warinschi. Computationally Sound Compositional Logic for Key Exchange Protocols. In CSFW 2006, pages 321-334. IEEE Computer Society, 2006. (Pubitemid 46499737)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 321-334
    • Datta, A.1    Derek, A.2    Mitchell, J.C.3    Warinschi, B.4
  • 15
    • 78650015837 scopus 로고    scopus 로고
    • On the (in)security of IPsec in MAC-then-encrypt configurations
    • ACM
    • J. P. Degabriele and K. G. Paterson. On the (In)Security of IPsec in MAC-then-Encrypt Configurations. In CCS 2010. ACM, 2010.
    • (2010) CCS 2010
    • Degabriele, J.P.1    Paterson, K.G.2
  • 16
    • 57049104588 scopus 로고    scopus 로고
    • Universally composable security analysis of TLS
    • J. Baek, F. Bao, K. Chen, and X. Lai, editors Springer
    • S. Gajek, M. Manulis, O. Pereira, A. Sadeghi, and J. Schwenk. Universally Composable Security Analysis of TLS. In J. Baek, F. Bao, K. Chen, and X. Lai, editors, ProvSec 2008, volume 5324 of LNCS, pages 313-327. Springer, 2008.
    • (2008) ProvSec 2008, Volume 5324 of LNCS , pp. 313-327
    • Gajek, S.1    Manulis, M.2    Pereira, O.3    Sadeghi, A.4    Schwenk, J.5
  • 17
    • 77952415066 scopus 로고    scopus 로고
    • Partnership in key exchange protocols
    • W. Li, W. Susilo, U. K. Tupakula, R. Safavi-Naini, and V. Varadharajan, editors ACM
    • K. Kobara, S. Shin, and M. Strefler. Partnership in key exchange protocols. In W. Li, W. Susilo, U. K. Tupakula, R. Safavi-Naini, and V. Varadharajan, editors, ASIACCS 2009, pages 161-170. ACM, 2009.
    • (2009) ASIACCS 2009 , pp. 161-170
    • Kobara, K.1    Shin, S.2    Strefler, M.3
  • 19
    • 33947621658 scopus 로고    scopus 로고
    • Simulation-based security with inexhaustible interactive turing machines
    • DOI 10.1109/CSFW.2006.30, 1648727, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • R. KÜsters. Simulation-Based Security with Inexhaustible Interactive Turing Machines. In CSFW 2006, pages 309-320. IEEE Computer Society, 2006. (Pubitemid 46499736)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 309-320
    • Kusters, R.1
  • 20
    • 51749119261 scopus 로고    scopus 로고
    • Joint state theorems for public-key encryption and digitial signature functionalities with local computation
    • IEEE Computer Society
    • R. Küsters and M. Tuengerthal. Joint State Theorems for Public-Key Encryption and Digitial Signature Functionalities with Local Computation. In CSF 2008, pages 270-284. IEEE Computer Society, 2008.
    • (2008) CSF 2008 , pp. 270-284
    • Küsters, R.1    Tuengerthal, M.2
  • 21
    • 70350540703 scopus 로고    scopus 로고
    • Universally composable symmetric encryption
    • IEEE Computer Society
    • R. Küsters and M. Tuengerthal. Universally Composable Symmetric Encryption. In CSF 2009, pages 293-307. IEEE Computer Society, 2009.
    • (2009) CSF 2009 , pp. 293-307
    • Küsters, R.1    Tuengerthal, M.2
  • 23
    • 79951780220 scopus 로고    scopus 로고
    • Ideal key derivation and encryption in simulation-based security
    • A. Kiayias, editor Springer
    • R. Küsters and M. Tuengerthal. Ideal Key Derivation and Encryption in Simulation-based Security. In A. Kiayias, editor, CT-RSA 2011, volume 6558 of LNCS, pages 161-179. Springer, 2011.
    • (2011) CT-RSA 2011, Volume 6558 of LNCS , pp. 161-179
    • Küsters, R.1    Tuengerthal, M.2
  • 24
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
    • (1995) Information Processing Letters , vol.56 , pp. 131-133
    • Lowe, G.1
  • 25
    • 75449107822 scopus 로고    scopus 로고
    • November
    • M. Ray and S. Dispensa. Renegotiating TLS. November 2009. Available at http: //extendedsubset.com/Renegotiating-TLS.pdf.
    • (2009) Renegotiating TLS
    • Ray, M.1    Dispensa, S.2
  • 26
    • 70350536583 scopus 로고    scopus 로고
    • Authentication without elision: Partially specified protocols, associated data, and cryptographic models described by code
    • IEEE Computer Society
    • P. Rogaway and T. Stegers. Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code. In CSF 2009, pages 26-39. IEEE Computer Society, 2009.
    • (2009) CSF 2009 , pp. 26-39
    • Rogaway, P.1    Stegers, T.2
  • 27
    • 70349147400 scopus 로고    scopus 로고
    • Practical attacks against WEP and WPA
    • D. A. Basin, S. Capkun, and W. Lee, editors ACM
    • E. Tews and M. Beck. Practical Attacks against WEP and WPA. In D. A. Basin, S. Capkun, and W. Lee, editors, WISEC 2009, pages 79-86. ACM, 2009.
    • (2009) WISEC 2009 , pp. 79-86
    • Tews, E.1    Beck, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.