메뉴 건너뛰기




Volumn 2016-August, Issue , 2016, Pages 164-178

On post-compromise security

Author keywords

Future Secrecy; Key Exchange; Post Compromise Security; Ratcheting; Security Protocols; Threat Models

Indexed keywords

SECURITY SYSTEMS;

EID: 84985947072     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2016.19     Document Type: Conference Paper
Times cited : (108)

References (32)
  • 1
    • 84911908058 scopus 로고    scopus 로고
    • Know your enemy: Compromising adversaries in protocol analysis
    • 17.2 (Nov. . ISSN: 1094-9224 (Visited on 04/11/ 2016
    • David Basin and Cas Cremers. "Know Your Enemy: Compromising Adversaries in Protocol Analysis". In: ACM Trans. Inf. Syst. Secur. 17.2 (Nov. 2014), 7:1-7:31. ISSN: 1094-9224. DOI: 10.1145/2658996. (Visited on 04/11/2016).
    • (2014) ACM Trans. Inf. Syst. Secur. , pp. 71-731
    • Basin, D.1    Cremers, C.2
  • 3
    • 34547313805 scopus 로고    scopus 로고
    • Stateful public-key cryptosystems: How to encrypt with one 160-bit exponentiation
    • New York, NY, USA: ACM (Visited on 11/10/ 2015
    • Mihir Bellare, Tadayoshi Kohno, and Victor Shoup. "Stateful Public-key Cryptosystems: How to Encrypt with One 160-bit Exponentiation". In: Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS '06. New York, NY, USA: ACM, 2006, pp. 380-389. DOI: 10.1145/1180405.1180452. (Visited on 11/10/2015).
    • (2006) Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS '06 , pp. 380-389
    • Bellare, M.1    Kohno, T.2    Shoup, V.3
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • LNCS 773. Springer Berlin Heidelberg, Jan. 1 (Visited on 05/21/2014)
    • Mihir Bellare and Phillip Rogaway. "Entity Authentication and Key Distribution". In: Advances in Cryptology -CRYPTO '93. LNCS 773. Springer Berlin Heidelberg, Jan. 1, 1994, pp. 232-249. DOI: 10 . 1007 / 3 -540 -48329 -2 21. (Visited on 05/21/2014).
    • (1994) Advances in Cryptology -CRYPTO '93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 84883099622 scopus 로고    scopus 로고
    • Drifting Keys: Impersonation detection for constrained devices
    • 2013 Proceedings IEEE INFOCOM. Apr.
    • K.D. Bowers et al. "Drifting Keys: Impersonation detection for constrained devices". In: 2013 Proceedings IEEE INFOCOM. 2013 Proceedings IEEE INFOCOM. Apr. 2013, pp. 1025-1033. DOI: 10.1109/INFCOM.2013.6566892.
    • (2013) 2013 Proceedings IEEE INFOCOM , pp. 1025-1033
    • Bowers, K.D.1
  • 8
    • 80755168373 scopus 로고    scopus 로고
    • Composability of bellare-rogaway key exchange protocols
    • (Visited on 07/27/ 2015
    • Christina Brzuska et al. "Composability of Bellare-rogaway Key Exchange Protocols". In: CCS. ACM, 2011, pp. 51-62. DOI: 10.1145/2046707.2046716. (Visited on 07/27/2015).
    • (2011) CCS ACM , pp. 51-62
    • Brzuska, C.1
  • 12
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • LNCS. Springer-Verlag
    • Ran Canetti and Hugo Krawczyk. "Analysis of key-exchange protocols and their use for building secure channels". In: EUROCRYPT. Vol. 2045. LNCS. Springer-Verlag, 2001, pp. 453-474.
    • (2001) EUROCRYPT , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 16
    • 84921068540 scopus 로고    scopus 로고
    • Beyond eCK: Perfect forward secrecy under actor compromise and ephemeralkey reveal English
    • Cas Cremers and Michèle Feltz. "Beyond eCK: perfect forward secrecy under actor compromise and ephemeralkey reveal". English. In: Designs, Codes and Cryptography (2013), pp. 1-36. DOI: 10.1007/s10623-013-9852-1.
    • (2013) Designs, Codes and Cryptography , pp. 1-36
    • Cremers, C.1    Feltz, M.2
  • 17
    • 84985936947 scopus 로고    scopus 로고
    • (visited on 02/11/ 2016 Nov. 2
    • Daniel Kahn Gillmor [TLS] OPTLS: Signature-less TLS 1.3. Nov. 2, 2014. URL: https://www.ietf.org/mail-archive/web/ tls/current/msg14423.html (visited on 02/11/2016).
    • (2014) [TLS] OPTLS: Signature-less TLS 1.3
    • Kahn Gillmor, D.1
  • 19
    • 84985923497 scopus 로고    scopus 로고
    • (visited on 11/07/ 2014
    • Tilman Frosch et al. How Secure is TextSecure' 904. 2014. URL: http://eprint.iacr.org/2014/904 (visited on 11/07/2014).
    • (2014) How Secure Is TextSecure' , vol.904
    • Frosch, T.1
  • 21
    • 77952405138 scopus 로고    scopus 로고
    • Forward security: Adaptive cryptography-time evolution
    • John Wiley and Sons
    • Gene Itkis. "Forward Security: Adaptive Cryptography -Time Evolution". In: Handbook of Information Security. Vol. 3. John Wiley and Sons, 2006.
    • (2006) Handbook of Information Security , vol.3
    • Itkis, G.1
  • 25
    • 84985988278 scopus 로고    scopus 로고
    • Nov. 12 (visited on 02/11/ 2016
    • Hugo Krawczyk. [TLS] OPTLS: Signature-less TLS 1.3. Nov. 12, 2014. URL: https://www.ietf.org/mail-archive/web/ tls/current/msg14592.html (visited on 02/11/2016).
    • (2014) [TLS] OPTLS: Signature-less TLS 1.3
    • Krawczyk, H.1
  • 26
    • 84987654576 scopus 로고    scopus 로고
    • (visited on 02/01/ 2016
    • Hugo Krawczyk and Hoeteck Wee. The OPTLS Protocol and TLS 1.3. 978. 2015. URL: https://eprint.iacr.org/2015/978 (visited on 02/01/2016).
    • (2015) The OPTLS Protocol and TLS 1 , vol.3 , pp. 978
    • Krawczyk, H.1    Wee, H.2
  • 27
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • LNCS Springer
    • B.A. LaMacchia, K. Lauter, and A. Mityagin. "Stronger Security of Authenticated Key Exchange". In: ProvSec. Vol. 4784. LNCS. Springer, 2007, pp. 1-16. DOI: 10.1007/ 978-3-540-75670-5 1.
    • (2007) ProvSec , vol.4784 , pp. 1-16
    • LaMacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 28
    • 84985922270 scopus 로고    scopus 로고
    • (visited on 06/22/ 2015
    • Adam Langley. Pond. 2014. URL: https://pond.imperialviolet. org/ (visited on 06/22/2015).
    • (2014) Pond
    • Langley, A.1
  • 29
    • 84978084202 scopus 로고    scopus 로고
    • Nov. 26 (visited on 02/09/ 2016
    • Moxie Marlinspike. Advanced cryptographic ratcheting. Nov. 26, 2013. URL: https : / / whispersystems . org / blog / advanced-ratcheting/ (visited on 02/09/2016).
    • (2013) Advanced Cryptographic Ratcheting
    • Marlinspike, M.1
  • 31
    • 84985934834 scopus 로고    scopus 로고
    • GitHub (visited on 06/22/ 2015
    • Trevor Perrin. trevp/axolotl. GitHub. 2014. URL: https:// github.com/trevp/axolotl (visited on 06/22/2015).
    • (2014) Trevp/axolotl
    • Perrin, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.