메뉴 건너뛰기




Volumn , Issue , 2007, Pages 119-134

Halting password puzzles: Hard-to-break encryption from human-memorable keys

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; OBSOLESCENCE; USER INTERFACES;

EID: 85071440512     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (28)

References (43)
  • 2
    • 21644435024 scopus 로고    scopus 로고
    • Technical report
    • BACK, A. Hashcash. Technical report, 1997. http://www.cypherspace.org/hashcash/.
    • (1997) Hashcash
    • Back, A.1
  • 6
    • 84869675754 scopus 로고    scopus 로고
    • Prompted user retrieval of secret entropy: The passmaze protocol
    • Report
    • BROWN, D. R. L. Prompted user retrieval of secret entropy: The passmaze protocol. Cryptology ePrint Archive, Report 2005/434, 2005. http://eprint.iacr.org/.
    • (2005) Cryptology ePrint Archive
    • Brown, D.R.L.1
  • 9
    • 84871245523 scopus 로고    scopus 로고
    • Mitigating dictionary attacks on password-protected local storage
    • Full version: Cryptology ePrint Archive, Report
    • CANETTI, R., HALEVI, S., AND STEINER, M. Mitigating dictionary attacks on password-protected local storage. In Advances in Cryptology—CRYPTO 2006. Full version: Cryptology ePrint Archive, Report 2006/276. http://eprint.iacr.org/.
    • Advances in Cryptology—CRYPTO 2006
    • Canetti, R.1    Halevi, S.2    Steiner, M.3
  • 10
    • 85077720156 scopus 로고    scopus 로고
    • CryptoCard. http://www.cryptocard.com
    • CryptoCard. http://www.cryptocard.com/.
  • 12
    • 85077711279 scopus 로고    scopus 로고
    • DigiPass. http://www.vasco.com/.
    • DigiPass
  • 17
    • 0032218224 scopus 로고    scopus 로고
    • Public-key cryptography and password protocols
    • HALEVI, S., AND KRAWCZYK, H. Public-key cryptography and password protocols. In ACM CCS 1998.
    • (1998) ACM CCS
    • Halevi, S.1    Krawczyk, H.2
  • 18
    • 0019038335 scopus 로고
    • A cryptanalytic time-memory trade-off
    • HELLMAN, M. E. A cryptanalytic time-memory trade-off. IEEE Trans. Information Theory 26, 4 (1980), 401–6.
    • (1980) IEEE Trans. Information Theory , vol.26 , Issue.4 , pp. 401-406
    • Hellman, M.E.1
  • 20
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • JABLON, D. Strong password-only authenticated key exchange. Computer Communication Review (1996).
    • (1996) Computer Communication Review
    • Jablon, D.1
  • 21
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic defense against connection depletion attacks
    • JUELS, A., AND BRAINARD, J. Client puzzles: A cryptographic defense against connection depletion attacks. In Proceedings of NDSS 1999.
    • Proceedings of NDSS 1999
    • Juels, A.1    Brainard, J.2
  • 25
    • 0031650516 scopus 로고    scopus 로고
    • Stretched exponential distributions in nature and economy:’fat tails’ with characteristic scales
    • LAHERRERE, J., AND SORNETTE, D. Stretched exponential distributions in nature and economy:’fat tails’ with characteristic scales. European Physical Journals B2 (1998), 525–39. http://xxx.lanl.gov/abs/cond-mat/9801293.
    • (1998) European Physical Journals B2 , pp. 525-539
    • Laherrere, J.1    Sornette, D.2
  • 26
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • LENSTRA, A. K., AND VERHEUL, E. R. Selecting cryptographic key sizes. Journal of Cryptology 14, 4 (2001), 255–93.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 31
    • 0004704295 scopus 로고    scopus 로고
    • Zipf’s law, the central limit theorem, and the random division of the unit interval
    • PERLINE, R. Zipf’s law, the central limit theorem, and the random division of the unit interval. Physical Review E 54, 1 (1996), 220–3.
    • (1996) Physical Review E , vol.54 , Issue.1 , pp. 220-223
    • Perline, R.1
  • 34
    • 0035619627 scopus 로고    scopus 로고
    • The pareto, zipf and other power laws
    • REED, W. J. The Pareto, Zipf and other power laws. Economics Letters 74, 1 (2001), 15–9.
    • (2001) Economics Letters , vol.74 , Issue.1 , pp. 15-19
    • Reed, W.J.1
  • 38
    • 85077697723 scopus 로고    scopus 로고
    • SecurID. http://www.rsasecurity.com/.
    • SecurID
  • 43
    • 12844275960 scopus 로고    scopus 로고
    • The memorability and security of passwords - Some empirical results
    • YAN, J., BLACKWELL, A., ANDERSON, R., AND GRANT, A. The memorability and security of passwords - some empirical results. IEEE Security and Privacy 2, 5 (2004), 25–31.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.