메뉴 건너뛰기




Volumn 1807, Issue , 2000, Pages 156-171

Provably secure password-authenticated key exchange using Diffie-Hellman

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84937550984     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45539-6_12     Document Type: Conference Paper
Times cited : (548)

References (30)
  • 1
    • 33746365751 scopus 로고
    • Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
    • D. Beaver. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. of Cryptology, 4(2):75-122, 1991.
    • (1991) J. Of Cryptology , vol.4 , Issue.2 , pp. 75-122
    • Beaver, D.1
  • 2
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • M. Bellare, R. Canetti, and H. Krawczyk. A modular approach to the design and analysis of authentication and key exchange protocols. In STOC’98, pages 419-428.
    • STOC’98 , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, pages 139-155.
    • (2000) In EUROCRYPT , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 84945119254 scopus 로고    scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO’93, pages 232-249.
    • CRYPTO’93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0027726717 scopus 로고    scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security (CCS’93), pages 62-73.
    • In ACM Security (CCS’93) , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0001940580 scopus 로고    scopus 로고
    • Provably secure session key distribution|the three party case
    • M. Bellare and P. Rogaway. Provably secure session key distribution|the three party case. In STOC’95, pages 57-66.
    • STOC’95 , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of IEEE Security and Privacy, pages 72-84, 1992.
    • (1992) Proceedings of IEEE Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 9
    • 0027741529 scopus 로고    scopus 로고
    • Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Security (CCS’93), pages 244-250.
    • ACM Security (CCS’93) , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 12
    • 0033280383 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols: The multi-user case
    • M. Boyarsky. Public-key cryptography and password protocols: The multi-user case. In ACM Security (CCS’99), pages 63-72.
    • ACM Security (CCS’99) , pp. 63-72
    • Boyarsky, M.1
  • 14
    • 0031619016 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In STOC’98, pages 209-218.
    • STOC’98 , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 15
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Info. Theory, 22(6):644-654, 1976.
    • (1976) IEEE Trans. Info. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 16
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Info. Theory, 31:469-472, 1985.
    • (1985) IEEE Trans. Info. Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 17
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In CRYPTO’99, pages 537-554.
    • CRYPTO’99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 18
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • L. Gong. Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
    • (1995) 8Th IEEE Computer Security Foundations Workshop , pp. 24-29
    • Gong, L.1
  • 20
    • 0032218224 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • S. Halevi and H. Krawczyk. Public-key cryptography and password protocols. In ACM Security (CCS’98), pages 122-131.
    • ACM Security (CCS’98) , pp. 122-131
    • Halevi, S.1    Krawczyk, H.2
  • 22
    • 0013443819 scopus 로고    scopus 로고
    • Extended password key exchange protocols immune to dictionary attack
    • D. Jablon. Extended password key exchange protocols immune to dictionary attack. In WETICE’97 Workshop on Enterprise Security, 1997.
    • (1997) WETICE’97 Workshop on Enterprise Security
    • Jablon, D.1
  • 23
    • 0024940229 scopus 로고
    • Reducing risks from poorly chosen keys
    • Dec, Proceedings of the 12th ACM Symposium on Operating System Principles
    • T. M. A. Lomas, L. Gong, J. H. Saltzer, and R. M. Needham. Reducing risks from poorly chosen keys. ACM Operating Systems Review, 23(5):14-18, Dec. 1989. Proceedings of the 12th ACM Symposium on Operating System Principles.
    • (1989) ACM Operating Systems Review , vol.23 , Issue.5 , pp. 14-18
    • Lomas, T.1    Gong, L.2    Saltzer, J.H.3    Needham, R.M.4
  • 24
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proceedings of the Workshop on Security Protocols, 1997.
    • (1997) Proceedings of the Workshop on Security Protocols
    • Lucks, S.1
  • 26
    • 0030648441 scopus 로고    scopus 로고
    • Number theoretic attacks on secure password schemes
    • S. Patel. Number theoretic attacks on secure password schemes. In Proceedings of IEEE Security and Privacy, pages 236-247, 1997.
    • (1997) Proceedings of IEEE Security and Privacy , pp. 236-247
    • Patel, S.1
  • 27
    • 3042666549 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • April
    • V. Shoup. On formal models for secure key exchange. IBM Research Report RZ 3120. April, 1999.
    • (1999) IBM Research Report RZ 3120
    • Shoup, V.1
  • 29
    • 0003331619 scopus 로고    scopus 로고
    • The secure remote password protocol
    • T. Wu. The secure remote password protocol. In NDSS’98, pages 97-111.
    • NDSS’98 , pp. 97-111
    • Wu, T.1
  • 30
    • 1942508825 scopus 로고    scopus 로고
    • A real world analysis of Kerberos password security
    • T. Wu. A real world analysis of Kerberos password security. In NDSS’99.
    • NDSS’99
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.