메뉴 건너뛰기




Volumn 2442, Issue , 2002, Pages 143-161

Security analysis of IKE’s signature-based key-exchange protocol

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; NETWORK SECURITY; SECURITY SYSTEMS;

EID: 84869635960     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45708-9_10     Document Type: Conference Paper
Times cited : (125)

References (22)
  • 1
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key-exchange protocols
    • M. Bellare, R. Canetti and H. Krawczyk, “A modular approach to the design and analysis of authentication and key-exchange protocols”, 30th STOC, 1998.
    • (1998) 30Th STOC
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 2
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Lecture Notes in Computer Science, D. Stinson ed, Springer-Verlag
    • M. Bellare and P. Rogaway, “Entity authentication and key distribution”, Advances in Cryptology, - CRYPTO’93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994, pp. 232-249.
    • (1994) Advances in Cryptology, - CRYPTO’93 , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0035163054 scopus 로고    scopus 로고
    • Universally Composable Security: A New paradigm for Cryptographic Protocols
    • Full version
    • R. Canetti, “Universally Composable Security: A New paradigm for Cryptographic Protocols”, 42nd FOCS, 2001. Full version available at http://eprint.iacr.org/2000/067.
    • (2001) 42Nd FOCS
    • Canetti, R.1
  • 4
    • 84858809967 scopus 로고    scopus 로고
    • Security Analysis of IKE’s Signature-based Key- Exchange Protocol
    • full version
    • Canetti, R., and Krawczyk, H., “Security Analysis of IKE’s Signature-based Key- Exchange Protocol”, full version. Cryptology ePrint Archive (http://eprint.iacr.org/), 2002.
    • (2002) Cryptology Eprint Archive
    • Canetti, R.1    Krawczyk, H.2
  • 5
    • 70350563149 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Full version in
    • Canetti, R., and Krawczyk, H., “Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels”, Advances in Cryptology – EUROCRYPT 2001, Full version in: http://eprint.iacr.org/2001/040.
    • Advances in Cryptology – EUROCRYPT 2001
    • Canetti, R.1    Krawczyk, H.2
  • 6
    • 3543100621 scopus 로고    scopus 로고
    • Universally Composable Notions of Key Exchange and Secure Channels
    • Full version
    • Canetti, R., and Krawczyk, H., “Universally Composable Notions of Key Exchange and Secure Channels”, Eurocrypt 02, 2002. Full version available at http://eprint.iacr.org/2002/059.
    • (2002) Eurocrypt 02
    • Canetti, R.1    Krawczyk, H.2
  • 7
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provable Secure Against Adaptive Chosen Ciphertext Attack
    • LNCS
    • R. Cramer and V. Shoup, “A Practical Public Key Cryptosystem Provable Secure Against Adaptive Chosen Ciphertext Attack”, In Crypto ’98, LNCS No. 1462, pages 13–25, 1998.
    • (1998) Crypto ’98 , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 11
    • 0003272021 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • D. Harkins and D. Carrel, ed., “The Internet Key Exchange (IKE)”, RFC 2409, Nov. 1998.
    • (1998) RFC 2409
    • Harkins, D.1    Carrel, D.2
  • 14
    • 0003068282 scopus 로고    scopus 로고
    • Security Architecture for the Internet Protocol
    • S. Kent and R. Atkinson, “Security Architecture for the Internet Protocol”, Request for Comments 2401, Nov. 1998.
    • (1998) Request for Comments 2401
    • Kent, S.1    Atkinson, R.2
  • 19
    • 0032630725 scopus 로고    scopus 로고
    • Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer
    • IEEE Computer Society Press, May
    • Meadows, C., “Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer”, Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 1999.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy
    • Meadows, C.1
  • 21
    • 0003294637 scopus 로고    scopus 로고
    • The OAKLEY Key Determination Protocol
    • Orman, H., “The OAKLEY Key Determination Protocol”, Request for Comments 2412, Nov. 1998.
    • (1998) Request for Comments 2412
    • Orman, H.1
  • 22
    • 0004023090 scopus 로고    scopus 로고
    • On Formal Models for Secure Key Exchange
    • V. Shoup, “On Formal Models for Secure Key Exchange”, Theory of Cryptography Library, 1999. Available at: http://philby.ucsd.edu/cryptolib/1999/99-12.html.
    • (1999) Theory of Cryptography Library
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.