메뉴 건너뛰기




Volumn 1587, Issue , 1999, Pages 51-63

Accelerating key establishment protocols for mobile communication

Author keywords

[No Author keywords available]

Indexed keywords

BASE STATIONS; SECURITY OF DATA; SMART CARDS;

EID: 84961346572     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48970-3_5     Document Type: Conference Paper
Times cited : (7)

References (37)
  • 1
    • 84961371662 scopus 로고
    • ETSI/TC Recommendation GSM 03.20
    • version 3.3.2
    • ETSI/TC Recommendation GSM 03.20. Security related network function. version 3.3.2, 1991.
    • (1991) Security Related Network Function
  • 2
    • 0028272762 scopus 로고
    • Privacy and authentication for wireless local area networks
    • A. Aziz and W. Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, 1:25-31, 1994.
    • (1994) IEEE Personal Communications , vol.1 , pp. 25-31
    • Aziz, A.1    Diffie, W.2
  • 3
    • 84955620732 scopus 로고
    • Secure acceleration of DSS signatures using insecure server
    • Philippe Beguin and Jean-Jacques Quisquater. Secure acceleration of DSS signatures using insecure server. In Asiacrypt’94, pages 249-259, 1994.
    • (1994) Asiacrypt’94 , pp. 249-259
    • Beguin, P.1    Quisquater, J.-J.2
  • 4
    • 84956854891 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A selective survey
    • Colin Boyd and Anish Mathuria. Key establishment protocols for secure mobile communications: A selective survey. In ACISP’98, Lecture Notes in Computer- Science, volume 1438, pages 344-355, 1998.
    • (1998) ACISP’98, Lecture Notes in Computer- Science , vol.1438 , pp. 344-355
    • Boyd, C.1    Mathuria, A.2
  • 6
    • 84955578798 scopus 로고
    • Attacks on protocols for server-aided RSA computation
    • B. Pfitzmann and M. Waidner. Attacks on protocols for server-aided RSA computation. In Eurocrypt’92, pages 153-162, 1992.
    • (1992) Eurocrypt’92 , pp. 153-162
    • Pfitzmann, B.1    Waidner, M.2
  • 8
    • 84957648348 scopus 로고
    • Security and performance of server-aided RSA computation protocols
    • C. H. Lim and P.J. Lee. Security and performance of server-aided RSA computation protocols. In Crypto’95, pages 70-83, 1995.
    • (1995) Crypto’95 , pp. 70-83
    • Lim, C.H.1    Lee, P.J.2
  • 9
    • 84957641879 scopus 로고
    • Server(Prover/signer)-aided verification of identity proofs and signature
    • C. H. Lim and P.J. Lee. Server(prover/signer)-aided verification of identity proofs and signature. In Eurocrypt’95, pages 64-78, 1995.
    • (1995) Eurocrypt’95 , pp. 64-78
    • Lim, C.H.1    Lee, P.J.2
  • 10
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • Kluwer Academic Publishers
    • W. Diffie, P.C.V. Oorschot, and M.J. Wiener. Authentication and authenticated key exchanges. In Designs, Codes and Cryptography, pages 107-125. Kluwer Academic Publishers, 1992.
    • (1992) Designs, Codes and Cryptography , pp. 107-125
    • Diffie, W.1    Oorschot, P.C.V.2    Wiener, M.J.3
  • 11
    • 84961367883 scopus 로고
    • ETSI. ETS 300 175-7, 1992.
    • (1992) ETS , vol.300 , pp. 175-177
  • 13
    • 0020194569 scopus 로고
    • Fast decipherment algorithm for RSA public-key cryptosystem
    • J.- J. Quisquater and C. Couvreur. Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters, 18(21):905-907, 1982.
    • (1982) Electronics Letters , vol.18 , Issue.21 , pp. 905-907
    • Quisquater, J.-J.1    Couvreur, C.2
  • 14
    • 0028381806 scopus 로고
    • Parameter selection for server-aided RSA computation schemes
    • J. Burns and C.J. Mitchell. Parameter selection for server-aided RSA computation schemes. IEEE Trans. on Computers, 43(2):163-174, 1994.
    • (1994) IEEE Trans. On Computers , vol.43 , Issue.2 , pp. 163-174
    • Burns, J.1    Mitchell, C.J.2
  • 15
    • 85028768002 scopus 로고
    • Security aspects of mobile communications
    • Springer Verlag
    • K. Vedder. Security aspects of mobile communications. In Computer Security and Industrial Cryptography, LNCS741, pages 193-210. Springer Verlag, 1993.
    • (1993) Computer Security and Industrial Cryptography, LNCS , vol.741 , pp. 193-210
    • Vedder, K.1
  • 16
    • 84961307173 scopus 로고    scopus 로고
    • Evaluation of authentication protocols for mobile environment value added services
    • Keith Martin and Chris Mitchell. Evaluation of authentication protocols for mobile environment value added services. In Draft, Available on-line as http://isg.rhbnc.ac.uk/cjm/EOAPFM.ZIP, 1998.
    • (1998) Draft
    • Martin, K.1    Mitchell, C.2
  • 18
    • 0027589399 scopus 로고
    • Fully-fledged two-way public key authentication and key agreement for low-cost terminals
    • May
    • M.J. Beller and Y. Yacobi. Fully-fledged two-way public key authentication and key agreement for low-cost terminals. Electronics Letters, 29:999-1001, May 1993.
    • (1993) Electronics Letters , vol.29 , pp. 999-1001
    • Beller, M.J.1    Yacobi, Y.2
  • 20
    • 84947806031 scopus 로고    scopus 로고
    • The beguin-quisquater server-aided RSA protocol from crypto’95 is not secure
    • Springer Verlag
    • Phong Nguyen and Jacques Stern. The beguin-quisquater server-aided RSA protocol from crypto’95 is not secure. In Advances in Cryptology - Asiacrypt’98, LNCS1514, pages 372-379. Springer Verlag, 1998.
    • (1998) Advances in Cryptology - Asiacrypt’98, LNCS , vol.1514 , pp. 372-379
    • Nguyen, P.1    Stern, J.2
  • 21
    • 0031234695 scopus 로고    scopus 로고
    • On certificate-based security protocols for wireless mobile communication systems
    • September/October
    • Choonsik Park. On certificate-based security protocols for wireless mobile communication systems. IEEE Network, pages 50-55, September/October 1997.
    • (1997) IEEE Network , pp. 50-55
    • Park, C.1
  • 22
    • 84969354234 scopus 로고
    • On key distribution and authentication in mobile radio networks
    • Springer Verlag
    • Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, and Shigeo Tsujii. On key distribution and authentication in mobile radio networks. In Advances in Cryptology - Eurocrypt’93, pages 461-465. Springer Verlag, 1994.
    • (1994) Advances in Cryptology - Eurocrypt’93 , pp. 461-465
    • Park, C.1    Kurosawa, K.2    Okamoto, T.3    Tsujii, S.4
  • 23
    • 84957639068 scopus 로고
    • Fast server-aided RSA signatures secure against active attacks
    • P. Beguin and J.J. Quisquater. Fast server-aided RSA signatures secure against active attacks. In Crypto’95, pages 57-69, 1995.
    • (1995) Crypto’95 , pp. 57-69
    • Beguin, P.1    Quisquater, J.J.2
  • 25
    • 0026897713 scopus 로고
    • Attack on server assisted authentication protocols
    • R.J. Anderson. Attack on server assisted authentication protocols. Electronics Letters, 28(15):1473, 1992.
    • (1992) Electronics Letters , vol.28 , Issue.15 , pp. 1473
    • Anderson, R.J.1
  • 26
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R.L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. CACM, 21:120-126, 1978.
    • (1978) CACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 27
    • 0029632472 scopus 로고
    • Cryptanalysis of secure addition chain for sasc applications
    • S.-M. Yen. Cryptanalysis of secure addition chain for sasc applications. Electronics Letters, 31(3):175-176, 1995.
    • (1995) Electronics Letters , vol.31 , Issue.3 , pp. 175-176
    • Yen, S.-M.1
  • 28
    • 0026955204 scopus 로고
    • More about the active attak on the server-aided secret computation protocol
    • S.-M. Yen and C.-S. Laih. More about the active attak on the server-aided secret computation protocol. Electronics Letters, 28(24):2250, 1992.
    • (1992) Electronics Letters , vol.28 , Issue.24 , pp. 2250
    • Yen, S.-M.1    Laih, C.-S.2
  • 29
    • 0027617773 scopus 로고
    • Fast server-aided secret computation protocols for modular exponentiation
    • S. Kawamura and A. Shimbo. Fast server-aided secret computation protocols for modular exponentiation. IEEE JSAC, 11(5):778-784, 1993.
    • (1993) IEEE JSAC , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 30
    • 84969340391 scopus 로고
    • Key distribution protocol for digital mobile communication systems
    • Springer Verlag
    • Makoto Tatebayashi, Natsume Matsuzaki, and David B. Newman, Jr. Key distribution protocol for digital mobile communication systems. In Advances in CryptologyCrypto’89, pages 324-334. Springer Verlag, 1990.
    • (1990) Advances in Cryptology , pp. 324-334
    • Tatebayashi, M.1    Matsuzaki, N.2    Newman, D.B.3
  • 31
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • july
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31:469-472, july 1985.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , pp. 469-472
    • Elgamal, T.1
  • 32
    • 85028812333 scopus 로고
    • On verifiable implicit asking protocols for RSA computation
    • T. Matsumoto, H. Imai, C.S. Laih, and S. M. Yen. On verifiable implicit asking protocols for RSA computation. In Auscrypt92, pages 296-307, 1993.
    • (1993) Auscrypt92 , pp. 296-307
    • Matsumoto, T.1    Imai, H.2    Laih, C.S.3    Yen, S.M.4
  • 33
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In Crypto’88, pages 497-506, 1988.
    • (1988) Crypto’88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 34
    • 0002378128 scopus 로고
    • Optimal privacy and authentication on a portable communications system
    • U. Carlsen. Optimal privacy and authentication on a portable communications system. ACM Operating Systems Review, 28(3):16-23, 1994.
    • (1994) ACM Operating Systems Review , vol.28 , Issue.3 , pp. 16-23
    • Carlsen, U.1
  • 37
    • 85032878997 scopus 로고
    • On key distribution systems
    • Springer Verlag
    • Y. Yacobi and Z Shmuley. On key distribution systems. In Advances in CryptologyCrypto’89, LNCS435, pages 344-355 Springer Verlag, 1989.
    • (1989) Advances in Cryptology , vol.435 , pp. 344-355
    • Yacobi, Y.1    Shmuley, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.