메뉴 건너뛰기




Volumn 2501, Issue , 2002, Pages 497-514

Group diffie-hellman key exchange secure against dictionary attacks

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTER CRIME; CRYPTOGRAPHY;

EID: 84958755223     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36178-2_31     Document Type: Conference Paper
Times cited : (110)

References (21)
  • 1
    • 0034317075 scopus 로고    scopus 로고
    • Key Agreementin Ad-hoc Networks
    • N. Asokan and P. Ginzboorg. Key Agreementin Ad-hoc Networks. Computer Communications, 23(18):1627–1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.18 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure Against Dictionary Attacks
    • B. Preneel, editor, LNCS 1807, Springer-Verlag
    • M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. In B. Preneel, editor, Proc. of Eurocrypt’00, LNCS 1807, pages 139–155. Springer-Verlag, 2000.
    • (2000) Proc of Eurocrypt’00 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 0026850091 scopus 로고
    • Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks
    • IEEE
    • S. M. Bellovin and M. Merrit. Encrypted Key Exchange: Password-based Protocols Secure against Dictionary Attacks. In Proc. of the Symposium on Security and Privacy, pages 72–84. IEEE, 1992.
    • (1992) Proc of the Symposium on Security and Privacy , pp. 72-84
    • Bellovin, S.M.1    Merrit, A.2
  • 5
    • 0003887033 scopus 로고    scopus 로고
    • Bluetooth, December
    • Bluetooth. Specification of the Bluetooth System, December 1999. Available at http://www.bluetooth.com/developer/specification/specification.asp.
    • (1999) Specification of the Bluetooth System
  • 6
    • 84947778144 scopus 로고    scopus 로고
    • The Decision Diffie-Hellman Problem
    • LNCS 1423, Springer-Verlag
    • D. Boneh. The Decision Diffie-Hellman Problem. In Third Algorithmic Number Theory Symposium, LNCS 1423, pages 48–63. Springer-Verlag, 1998.
    • (1998) Third Algorithmic Number Theory Symposium , pp. 48-63
    • Boneh, D.1
  • 7
    • 84937550984 scopus 로고    scopus 로고
    • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
    • LNCS 1807, Springer-Verlag
    • V. Boyko, P. MacKenzie, and S. Patel. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In B. Preneel, editor, Proc. of Eurocrypt’01, LNCS 1807, pages 156–171. Springer-Verlag, 2000.
    • (2000) Proc of Eurocrypt’01 , pp. 156-171
    • Boyko, V.1    Mackenzie, P.2    Patel, S.3
  • 8
    • 18744403812 scopus 로고    scopus 로고
    • Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
    • Y. Zheng, editor, Springer, December, Full Version –
    • E. Bresson, O. Chevassut, and D. Pointcheval. Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks. In Y. Zheng, editor, Proc. of Asiacrypt’2002. Springer, December 2002. Full Version – http://www.di.ens.fr/users/pointche.
    • (2002) Proc of Asiacrypt’2002
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 9
    • 18744403812 scopus 로고    scopus 로고
    • The Group Diffie-Hellman Problems
    • H. Heys and K. Nyberg, editors, LNCS. Springer-Verlag, August
    • E. Bresson, O. Chevassut, and D. Pointcheval. The Group Diffie-Hellman Problems. In H. Heys and K. Nyberg, editors, Proc. of SAC’2002, LNCS. Springer-Verlag, August 2002.
    • (2002) Proc of SAC’2002
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
  • 12
    • 84880888233 scopus 로고    scopus 로고
    • Session-Key Generation using Human Passwords Only
    • J. Kilian, editor, LNCS 2139, Springer-Verlag, August
    • O. Goldreich and Y. Lindell. Session-Key Generation using Human Passwords Only. In J. Kilian, editor, Proc. of Crypto’01, LNCS 2139, pages 408–432. Springer-Verlag, August 2001.
    • (2001) Proc of Crypto’01 , pp. 408-432
    • Goldreich, O.1    Lindell, Y.2
  • 14
    • 84945132563 scopus 로고    scopus 로고
    • Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords
    • LNCS 2045, Springer-Verlag, May
    • J. Katz, R. Ostrovsky, and M. Yung. Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords. In Proc. of Eurocrypt’01, LNCS 2045, pages 475–494. Springer-Verlag, May 2001.
    • (2001) Proc of Eurocrypt’01 , pp. 475-494
    • Katz, J.1    Ostrovsky, R.2    Yung, M.3
  • 15
    • 84937579448 scopus 로고    scopus 로고
    • More Efficient Password Authenticated Key Exchange
    • D. Naccache, editor, LNCS 2020, Springer-Verlag
    • P. MacKenzie. More Efficient Password Authenticated Key Exchange. In D. Naccache, editor, RSA Conference’01, LNCS 2020, pages 361–377. Springer-Verlag, 2001.
    • (2001) RSA Conference’01 , pp. 361-377
    • Mackenzie, P.1
  • 16
    • 0031332843 scopus 로고    scopus 로고
    • Number-Theoretic Constructions of Efficient Pseudo-Random Functions
    • IEEE
    • M. Naor and O. Reingold. Number-Theoretic Constructions of Efficient Pseudo-Random Functions. In Proc. of 38th FOCS, pages 458–467. IEEE, 1997.
    • (1997) Proc of 38Th FOCS , pp. 458-467
    • Naor, M.1    Reingold, O.2
  • 17
    • 84958811016 scopus 로고    scopus 로고
    • NIST, AES, December
    • NIST. AES, December 2000. Available at http://www.nist.gov/aes.
    • (2000)
  • 20
    • 84880904783 scopus 로고    scopus 로고
    • OAEP Reconsidered
    • J. Kilian, editor, LNCS 2139, Springer-Verlag
    • V. Shoup. OAEP Reconsidered. In J. Kilian, editor, Proc. of Cryto’ 01, LNCS 2139, pages 239–259. Springer-Verlag, 2001.
    • (2001) Proc of Cryto’ 01 , pp. 239-259
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.