메뉴 건너뛰기




Volumn 6531 LNCS, Issue , 2011, Pages 54-68

Security analysis of the extended access control protocol for machine readable travel documents

Author keywords

authenticated key exchange; German electronic ID card; machine readable travel document; provable security

Indexed keywords

ACCESS CONTROL; LANTHANUM COMPOUNDS; RADIO TRANSMITTERS; SECURITY OF DATA;

EID: 85037097485     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-18178-8_6     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 1
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Vaudenay, S. (ed.) PKC 2005. Springer, Heidelberg
    • Abdalla, M., Fouque, P.A., Pointcheval, D.: Password-based authenticated key exchange in the three-party setting. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 65-84. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.A.2    Pointcheval, D.3
  • 2
    • 70349858083 scopus 로고    scopus 로고
    • Efficient One-Round Key Exchange in the Standard Model
    • Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. Springer, Heidelberg
    • Boyd, C., Cliff, Y., Gonzalez Nieto, J., Paterson, K.G.: Efficient One-Round Key Exchange in the Standard Model. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 69-83. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5107 , pp. 69-83
    • Boyd, C.1    Cliff, Y.2    Gonzalez Nieto, J.3    Paterson, K.G.4
  • 3
    • 70350424437 scopus 로고    scopus 로고
    • Security Analysis of the PACE Key-Agreement Protocol
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Bender, J., Fischlin, M., Kuegler, D.: Security Analysis of the PACE Key-Agreement Protocol. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 33-48. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 33-48
    • Bender, J.1    Fischlin, M.2    Kuegler, D.3
  • 4
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short Signatures from the Weil Pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 68849108882 scopus 로고    scopus 로고
    • Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. Springer, Heidelberg
    • Cremers, C.J.F.: Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20-33. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5536 , pp. 20-33
    • Cremers, C.J.F.1
  • 10
    • 77949583585 scopus 로고    scopus 로고
    • Delayed-Key Message Authentication for Streams
    • Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
    • Fischlin, M., Lehmann, A.: Delayed-Key Message Authentication for Streams. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 290-307. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5978 , pp. 290-307
    • Fischlin, M.1    Lehmann, A.2
  • 11
    • 21144454271 scopus 로고    scopus 로고
    • Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups
    • DOI 10.1007/s00145-003-0052-4
    • Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. J. Cryptology 16(4), 239-247 (2003) (Pubitemid 40877275)
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 12
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
    • Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
    • Choo, K.K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.