메뉴 건너뛰기




Volumn 16, Issue 5, 2014, Pages 393-396

Cryptanalysis of a three-party password-based authenticated key exchange protocol

Author keywords

Cryptanalysis; Guessing attack; Off line password; Password

Indexed keywords

CRYPTOGRAPHY;

EID: 84902255257     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (19)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • 'Authenticated key exchange secure against dictionary attacks'
    • LNCS 1807
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of Eurocrypt'00, LNCS 1807, pp. 139-155, 2000.
    • (2000) Proceedings of Eurocrypt'00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password-authenticated key exchange using Diffie-Hellman
    • LNCS 1807
    • V. Boyko, P. MacKenzie, and S. Patel. Provably secure password-authenticated key exchange using Diffie-Hellman. In Proceedings of the Eurocrypt '00, LNCS 1807, pages 156-171, 2000.
    • (2000) Proceedings of the Eurocrypt '00 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 4
    • 34948903343 scopus 로고    scopus 로고
    • Three weaknesses in a simple three-party key exchange protocol
    • H. R. Chung and W. C. Ku. Three weaknesses in a simple three-party key exchange protocol. Information Science, 178(1): 220-229, 2008.
    • (2008) Information Science , vol.178 , Issue.1 , pp. 220-229
    • Chung, H.R.1    Ku, W.C.2
  • 6
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • Y. Ding and P. Horster. Undetectable on-line password guessing attacks. ACM Operating Systems Review, 29(4): 77-86, 1995.
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 7
    • 44849118543 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol
    • H. Guo, Z. Li, Y. Mu, and X. Zhang. Cryptanalysis of simple three-party key exchange protocol. Computers and Security, 27(1-2): 16-21, 2008.
    • (2008) Computers and Security , vol.27 , Issue.1-2 , pp. 16-21
    • Guo, H.1    Li, Z.2    Mu, Y.3    Zhang, X.4
  • 9
    • 24144432254 scopus 로고    scopus 로고
    • Password based key exchange with mutual authentication
    • LNCS 3357
    • S. Jiang and G. Gong. Password based key exchange with mutual authentication. In Proceedings of SAC '04, LNCS 3357, pages 267-279, 2005.
    • (2005) Proceedings of SAC '04 , pp. 267-279
    • Jiang, S.1    Gong, G.2
  • 10
    • 84945132563 scopus 로고    scopus 로고
    • Efficient password-authenticated key exchange using human-memorable passwords
    • LNCS 2045
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient password-authenticated key exchange using human-memorable passwords. In Proceedings of the Eurocrypt '01, LNCS 2045, pages 475-494, 2001.
    • (2001) Proceedings of the Eurocrypt '01 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 11
    • 0008145442 scopus 로고    scopus 로고
    • Three party-encrypted key exchange: attacks and a solution
    • C. L. Lin, H. M. Sun, and T. Hwang. Three party-encrypted key exchange: attacks and a solution. ACM Operating Systems Review, 34(4): 12-20, 2000.
    • (2000) ACM Operating Systems Review , vol.34 , Issue.4 , pp. 12-20
    • Lin, C.L.1    Sun, H.M.2    Hwang, T.3
  • 13
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • R. X. Lu and Z. F. Cao. Simple three-party key exchange protocol. Computers and Security, 26(1): 94-97, 2007.
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 14
    • 8344221264 scopus 로고    scopus 로고
    • Enhanced three-party encrypted key exchange without server public keys
    • T. F. Lee, T. Hwang, and C. L. Lin. Enhanced three-party encrypted key exchange without server public keys. Computers and Security, 23(7): 571-577, 2004.
    • (2004) Computers and Security , vol.23 , Issue.7 , pp. 571-577
    • Lee, T.F.1    Hwang, T.2    Lin, C.L.3
  • 15
    • 33845941453 scopus 로고    scopus 로고
    • Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    • J. Nam, Y. Lee, S. Kim, and D. Won. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Information Sciences, 177(6): 1364-1375, 2007.
    • (2007) Information Sciences , vol.177 , Issue.6 , pp. 1364-1375
    • Nam, J.1    Lee, Y.2    Kim, S.3    Won, D.4
  • 16
    • 42649086478 scopus 로고    scopus 로고
    • Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
    • C. W. Phan Raphael, W. C. Yau, and B. M. Goi. Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Information Science, 178(13): 2849-2856, 2008.
    • (2008) Information Science , vol.178 , Issue.13 , pp. 2849-2856
    • Phan Raphael, C.W.1    Yau, W.C.2    Goi, B.M.3
  • 17
  • 18
    • 21644467750 scopus 로고    scopus 로고
    • Provably secure three-party password-based authenticated key exchange protocol using Weil pairing
    • H. A. Wen, T. F. Lee, and T. Hwang. Provably secure three-party password-based authenticated key exchange protocol using Weil pairing. IEE Proceedings-Communications, 152(2): 138-143, 2005.
    • (2005) IEE Proceedings-Communications , vol.152 , Issue.2 , pp. 138-143
    • Wen, H.A.1    Lee, T.F.2    Hwang, T.3
  • 19
    • 33745922955 scopus 로고    scopus 로고
    • New approaches to password authenticated key exchange based on RSA
    • LNCS 3329
    • M. Zhang. New approaches to password authenticated key exchange based on RSA. In Proceedings of the Asiacrypt'04, LNCS 3329, pages 230-244, 2004.
    • (2004) Proceedings of the Asiacrypt'04 , pp. 230-244
    • Zhang, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.