메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 248-262

A computational analysis of the Needham-Schröeder-(Lowe) protocol

Author keywords

Authentication; Computational modeling; Computer science; Context modeling; Cryptographic protocols; Drives; Engineering profession; History; Public key cryptography; Security

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; COMPUTATIONAL METHODS; COMPUTER SCIENCE; DRIVES; HISTORY; PROFESSIONAL ASPECTS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84942255620     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2003.1212717     Document Type: Conference Paper
Times cited : (34)

References (21)
  • 1
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (the computational soundness of formal encryption)
    • M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proc. of EUROCRYPT'00
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In Proc. of EUROCRYPT'00, LNCS, 2000.
    • (2000) LNCS
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 5
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Proceedings of CRYPTO'93
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of CRYPTO'93, volume 773 of Lecture Notes in Computer Science, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • March
    • D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198-208, March 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 8
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, 31:469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • Elgamal, T.1
  • 13
    • 28144456308 scopus 로고
    • An attack on the Needham-Schroeder public key authentication protocol
    • November
    • G. Lowe. An attack on the Needham-Schroeder public key authentication protocol. Information processing letters, 56(3):131-136, November 1995.
    • (1995) Information Processing Letters , vol.56 , Issue.3 , pp. 131-136
    • Lowe, G.1
  • 14
    • 0003130993 scopus 로고    scopus 로고
    • Breaking and fixing the Needham-Schröeder algorithm
    • Springer-Verlag
    • G. Lowe. Breaking and fixing the Needham-Schröeder algorithm. In Proc. of TACAS'96, pages 147-166. Springer-Verlag, 1996.
    • (1996) Proc. of TACAS'96 , pp. 147-166
    • Lowe, G.1
  • 16
    • 0030084918 scopus 로고    scopus 로고
    • The NRL protocol analyzer: An overview
    • C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
    • (1996) Journal of Logic Programming , vol.26 , Issue.2 , pp. 113-131
    • Meadows, C.1
  • 17
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of ACM, December 1978.
    • (1978) Communications of ACM
    • Needham, R.1    Schroeder, M.2
  • 19
    • 84974554584 scopus 로고
    • Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack
    • C. Rackoff and D. Simon. Noninteractive zero-knowledge proofs of knowledfe and chosen ciphertext attack. In Advances in Cryptology- CRYPTO'91, pages 433-444, 1991.
    • (1991) Advances in Cryptology- CRYPTO'91 , pp. 433-444
    • Rackoff, C.1    Simon, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.