메뉴 건너뛰기




Volumn 2513, Issue , 2002, Pages 134-146

Password-authenticated key exchange between clients with different passwords

Author keywords

Cross realm; Dictionary attack; Kerberos; Key exchange; Password authentication

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84944063128     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36159-6_12     Document Type: Conference Paper
Times cited : (93)

References (17)
  • 1
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Springer- Verlag
    • M. Bellare, D. Pointcheval and P. Rogaway, “Authenticated key exchange secure against dictionary attacks”, Eurocrypt’00, LNCS Vol.1807, pp.139-155, Springer- Verlag, 2000.
    • (2000) Eurocrypt’00, LNCS Vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 2
    • 0026850091 scopus 로고
    • Encrypted key exchange: Password based protocols secure against dictionary attacks
    • IEEE
    • S. Bellovin and M. Merrit, “Encrypted key exchange: password based protocols secure against dictionary attacks”, In Proceedings of the Symposium on Security and Privacy, pp.72-84, IEEE, 1992.
    • (1992) Proceedings of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.1    Merrit, M.2
  • 3
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • Springer-Verlag
    • C. Boyd, A. Mathuria, “Key establishment protocols for secure mobile communications: A selective survey”, ACISP’98, LNCS Vol.1438, pp.344-355, Springer-Verlag, 1998.
    • (1998) ACISP’98, LNCS Vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 4
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel, “Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman”, Eurocrypt’00, LNCS Vol.1807, pp.156-171, Springer-Verlag, 2000
    • (2000) Eurocrypt’00, LNCS Vol.1807 , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 5
    • 84947224925 scopus 로고    scopus 로고
    • Efficient kerberized multicast in a practical distributed setting
    • Springer-Verlag
    • G. D. Crescenzo, O. Kornievskaia, “Efficient kerberized multicast in a practical distributed setting”, ISC’01, LNCS Vol.2200, pp.27-45, Springer-Verlag, 2001.
    • (2001) ISC’01, LNCS Vol.2200 , pp. 27-45
    • Crescenzo, G.D.1    Kornievskaia, O.2
  • 6
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning, G. Sacco, “Timestamps in key distribution protocols”, Communications of the ACM, Vol.24, No.8, pp.533-536, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 7
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, “Strong password-only authenticated key exchange”, Computer Communication Review, Vol.26, No.5, pp.5-26, 1996.
    • (1996) Computer Communication Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 8
    • 84880888233 scopus 로고    scopus 로고
    • Session-Key Generation Using Human Passwords Only
    • Springer-Verlag
    • O. Goldreich and Y. Lindell, “Session-Key Generation Using Human Passwords Only”, Crypto’01, LNCS Vol.2139, pp.408-432, Springer-Verlag, 2001.
    • (2001) Crypto’01, LNCS Vol.2139 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 9
    • 85084161708 scopus 로고    scopus 로고
    • Dual-workfactor encrypted key exchange: Efficiency preventing password chaining attacks
    • July
    • B. Jaspan, “Dual-workfactor encrypted key exchange: Efficiency preventing password chaining attacks”, In Proceedings of the sixth annual USENIX security conference, pp.43-50, July 1996.
    • (1996) Proceedings of the Sixth Annual USENIX Security Conference , pp. 43-50
    • Jaspan, B.1
  • 11
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
    • Springer-Verlag
    • J. Katz, R. Ostrovsky and M. Yung, “Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords”, Eurocrypt’01, LNCS Vol.2045, pp.475-494, Springer-Verlag, 2001.
    • (2001) Eurocrypt’01, LNCS Vol.2045 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 12
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: How to defeat dictionary attacks without encryting public keys
    • S. Lucks, “Open key exchange: How to defeat dictionary attacks without encryting public keys”, The security Protocol Workshop’97, pp.79-90, 1997.
    • (1997) The Security Protocol Workshop’97 , pp. 79-90
    • Lucks, S.1
  • 13
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waider, “Refinement and extension of encrypted key exchange”, ACM Operation Sys. Review, Vol.29, No.3, pp.22-30, 1995.
    • (1995) ACM Operation Sys. Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waider, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.