메뉴 건너뛰기




Volumn 2020, Issue , 2001, Pages 361-377

More efficient password-authenticated key exchange

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; EFFICIENCY;

EID: 84937579448     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45353-9_27     Document Type: Conference Paper
Times cited : (47)

References (24)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT2000, pages 139-155.
    • EUROCRYPT2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 2
    • 84945119254 scopus 로고    scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO '93, pages 232-249.
    • CRYPTO '93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 0027726717 scopus 로고    scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM Security '93, pages 62-73.
    • ACM Security '93 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 84948986458 scopus 로고    scopus 로고
    • Optimal asymmetric encryption
    • M. Bellare and P. Rogaway. Optimal asymmetric encryption. In EUROCRYPT 94, pages 92-111.
    • EUROCRYPT 94 , pp. 92-111
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 0026850091 scopus 로고    scopus 로고
    • Encrypted key exchange: Password-based protocols secure against dictionary attacks
    • S. M. Bellovin and M. Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In IEEE Security 92, pages 72-84.
    • IEEE Security , vol.92 , pp. 72-84
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 0027741529 scopus 로고    scopus 로고
    • Augumented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
    • S. M. Bellovin and M. Merritt. Augumented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM Security '93, pages 244-250.
    • ACM Security '93 , pp. 244-250
    • Bellovin, S.M.1    Merritt, M.2
  • 8
    • 84937550984 scopus 로고    scopus 로고
    • Provably-secure password authentication and key exchange using Diffe-Hellman
    • V. Boyko, P. MacKenzie, and S. Patel. Provably-secure password authentication and key exchange using Diffe-Hellman. In EUROCRYPT2000, pages 156-171.
    • EUROCRYPT2000 , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 9
    • 0031619016 scopus 로고    scopus 로고
    • The random oracle methodology, revisited
    • R. Canetti, O. Goldreich, and S. Halevi. The random oracle methodology, revisited. In STOC '98, pages 209-218.
    • STOC '98 , pp. 209-218
    • Canetti, R.1    Goldreich, O.2    Halevi, S.3
  • 10
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • L. Gong. Optimal authentication protocols resistant to password guessing attacks. In 8th IEEE Computer Security Foundations Workshop, pages 24-29, 1995.
    • (1995) 8Th IEEE Computer Security Foundations Workshop , pp. 24
    • Gong, L.1
  • 12
    • 84937582977 scopus 로고    scopus 로고
    • IEEE. IEEE1363, "Standard Specifications for Public Key Cryptography"
    • IEEE. IEEE1363, "Standard Specifications for Public Key Cryptography", 2000.
    • (2000)
  • 13
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange. ACM Computer Communication Review
    • D. Jablon. Strong password-only authenticated key exchange. ACM Computer Communication Review, ACM SIGCOMM, 26(5):5-20, 1996.
    • (1996) ACM SIGCOMM , vol.26 , Issue.5 , pp. 5-20
    • Jablon, D.1
  • 14
    • 0013443819 scopus 로고    scopus 로고
    • Extended password key exchange protocols immune to dictionary attack
    • D. Jablon. Extended password key exchange protocols immune to dictionary attack. In WETICE'97 Workshop on Enterprise Security, 1997.
    • (1997) WETICE'97 Workshop on Enterprise Security
    • Jablon, D.1
  • 15
    • 0032319637 scopus 로고    scopus 로고
    • Lower bounds for zero knowledge on the internet
    • J. Kilian, E. Petrank, and C. Rackoff. Lower bounds for zero knowledge on the internet. In FOCS '98, pages 484-492.
    • FOCS '98 , pp. 484-492
    • Kilian, J.1    Petrank, E.2    Rackoff, C.3
  • 17
  • 18
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encrypting public keys
    • S. Lucks. Open key exchange: How to defeat dictionary attacks without encrypting public keys. In Proceedings of the Workshop on Security Protocols, 1997.
    • (1997) Proceedings of the Workshop on Security Protocols
    • Lucks, S.1
  • 19
    • 0013276119 scopus 로고    scopus 로고
    • Password-authenticated key exchange based on RSA
    • page to appear
    • P. MacKenzie, S. Patel, and R. Swaminathan. Password-authenticated key exchange based on RSA. In ASIACRYPT2000, page to appear.
    • ASIACRYPT2000
    • Mackenzie, P.1    Patel, S.2    Swaminathan, R.3
  • 21
    • 35048824789 scopus 로고    scopus 로고
    • On formal models for secure key exchange
    • V. Shoup. On formal models for secure key exchange. In ACM Security '99.
    • ACM Security '99
    • Shoup, V.1
  • 23
    • 84937582981 scopus 로고
    • U. S. Department of Commerce/N. I. S. T., Springffeld, Virginia. FIPS186, "Digital Signature Standard", Federal Information Processing Standards Publication 186
    • U. S. Department of Commerce/N. I. S. T., Springffeld, Virginia. FIPS186, "Digital Signature Standard", Federal Information Processing Standards Publication 186, 1994.
    • (1994)
  • 24
    • 0003331619 scopus 로고    scopus 로고
    • The secure remote password protocol
    • T. Wu. The secure remote password protocol. In NDSS '98, pages 97-111.
    • NDSS '98 , pp. 97-111
    • Wu, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.