메뉴 건너뛰기




Volumn , Issue , 1996, Pages

Dual-workfactor encrypted key exchange: Efficiently preventing password chaining and dictionary attacks

(1)  Jaspan, Barry a  

a NONE   (United States)

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 85084161708     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (26)
  • 2
    • 0011716691 scopus 로고
    • Limitations of the kerberos authentication system
    • Dallas, TX, Winter USENIX. A version of this paper was published in the October, 1990 issue of Computer Communications Review
    • Steven M. Bellovin and Michael Merritt. Limitations of the Kerberos authentication system. In USENIX Conference Proceedings, pages 253-267, Dallas, TX, Winter 1991. USENIX. A version of this paper was published in the October, 1990 issue of Computer Communications Review.
    • (1991) USENIX Conference Proceedings , pp. 253-267
    • Bellovin, S.M.1    Merritt, M.2
  • 6
    • 85077731020 scopus 로고    scopus 로고
    • Don Davis. Personal communication
    • Don Davis. Personal communication.
  • 8
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Dime and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644-654, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , pp. 644-654
    • Dime, W.1    Hellman, M.E.2
  • 10
    • 0002805220 scopus 로고
    • Undetectable online password guessing attacks
    • October
    • Yun Ding and Patrick Horster. Undetectable online password guessing attacks. Operating Systems Review, 29(4):77-86, October 1995.
    • (1995) Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Horster, P.2
  • 12
    • 7544231329 scopus 로고
    • UNIX password security - Ten years later
    • G. Brassard, editor Springer-Verlag Lecture Notes in Computer Science No. 435
    • David C. Feldmeirer and Philip R. Karn. UNIX password security - ten years later. In G. Brassard, editor, Proc. CRYPTO 89, pages 44-63. Springer-Verlag, 1990. Lecture Notes in Computer Science No. 435.
    • (1990) Proc. CRYPTO 89 , pp. 44-63
    • Feldmeirer, D.C.1    Karn, P.R.2
  • 17
    • 20344369243 scopus 로고
    • Computation of discrete logarithms in prime fields
    • A.J. Menezes and S. A. Vanstone, editors Springer-Verlag Lecture Notes in Computer Science No. 537
    • B.A. LaMacchia and A.M. Odlyzko. Computation of discrete logarithms in prime fields. In A.J. Menezes and S. A. Vanstone, editors, Proc. CRYPTO 90, pages 616-618. Springer-Verlag, 1991. Lecture Notes in Computer Science No. 537.
    • (1991) Proc. CRYPTO 90 , pp. 616-618
    • LaMacchia, B.A.1    Odlyzko, A.M.2
  • 19
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 20
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B. Clifford Neuman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, September 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Clifford Neuman, B.1    Ts'o, T.2
  • 22
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • January
    • S. C. Pohlig and M. E. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory, IT-24:106-110, January 1978.
    • (1978) IEEE Trans. Inform. Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 25
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, Texas, February
    • J.G. Steiner, B.C. Neuman, and J.I. Schiller. Kerberos: an authentication service for open network systems. In Usenix Conference Proceedings, pages 191-202, Dallas, Texas, February 1988.
    • (1988) Usenix Conference Proceedings , pp. 191-202
    • Steiner, J.G.1    Neuman, B.C.2    Schiller, J.I.3
  • 26
    • 3142744801 scopus 로고    scopus 로고
    • On diffie-hellman key agreement with short exponents
    • (to appear). Springer-Verlag
    • P. C. van Oorschotand M. J. Wiener. On Diffie-Hellman key agreement with short exponents. In Proceedings of Eurocrypt '96 (to appear). Springer-Verlag, 1996.
    • (1996) Proceedings of Eurocrypt '96
    • Van Oorschot, P.C.1    Wiener, M.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.