메뉴 건너뛰기




Volumn , Issue , 2001, Pages

Authentication and Key Agreement via Memorable Password

(1)  Kwon, Taekyoung a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY; NETWORK SECURITY;

EID: 85180777204     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (61)

References (39)
  • 1
    • 0028446389 scopus 로고
    • Fortifying key negotiation schemes with poorly chosen passwords
    • R. Anderson and T. Lomas, “Fortifying key negotiation schemes with poorly chosen passwords,” Electronics Letters, vol.30, no.13, pp.1040-1041, 1994
    • (1994) Electronics Letters , vol.30 , Issue.13 , pp. 1040-1041
    • Anderson, R.1    Lomas, T.2
  • 3
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • M. Bellare and P. Rogaway, “Entity authentication and key distribution,” In CRYPTO 93, 1993
    • (1993) In CRYPTO , vol.93
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 0031642585 scopus 로고    scopus 로고
    • A modular approach to the design and analysis of authentication and key exchange protocols
    • M. Bellare, R. Canetti, and H. Krawczyk, “A modular approach to the design and analysis of authentication and key exchange protocols,” In STOC, pp.419-428, 1998
    • (1998) In STOC , pp. 419-428
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 0010254150 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attack
    • M. Bellare, D. Pointcheval and P. Rogaway, “Authenticated key exchange secure against dictionary attack,” In Eurocrypt 00, 2000
    • (2000) Eurocrypt 00
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 8
    • 0027741529 scopus 로고
    • Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise
    • S. Bellovin and M. Merritt, “Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise,” In ACM Conference on Computer and Communications Security, pp. 244-250, 1993
    • (1993) In ACM Conference on Computer and Communications Security , pp. 244-250
    • Bellovin, S.1    Merritt, M.2
  • 10
    • 3042657129 scopus 로고    scopus 로고
    • Provably secure password authenticated key exchange using Diffie-Hellman
    • V. Boyko, P. MacKenzie and S. Patel, “Provably secure password authenticated key exchange using Diffie-Hellman,” In Eurocrypt 00, 2000
    • (2000) Eurocrypt 00
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 12
    • 84976665942 scopus 로고
    • Timestamps in key distribution protocols
    • D. Denning and G. Sacco, “Timestamps in key distribution protocols,” Communications of the ACM, vol.24, no.8, pp.533-536, 1981
    • (1981) Communications of the ACM , vol.24 , Issue.8 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 14
    • 0002805220 scopus 로고
    • Undetectable on-line password guessing attacks
    • October
    • Y. Ding and P. Hoster, “Undetectable on-line password guessing attacks,” ACM Operating Systems Review, vol.29, no.4, pp.77-86, October 1995
    • (1995) ACM Operating Systems Review , vol.29 , Issue.4 , pp. 77-86
    • Ding, Y.1    Hoster, P.2
  • 16
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • June
    • L. Gong, “Optimal authentication protocols resistant to password guessing attacks,” In IEEE Computer Security Foundation Workshop, pp. 24-29, June 1995
    • (1995) IEEE Computer Security Foundation Workshop , pp. 24-29
    • Gong, L.1
  • 18
    • 0030261758 scopus 로고    scopus 로고
    • Strong password-only authenticated key exchange
    • D. Jablon, “Strong password-only authenticated key exchange,” ACM Computer Communications Review, vol.26, no.5, pp.5-26, 1996
    • (1996) ACM Computer Communications Review , vol.26 , Issue.5 , pp. 5-26
    • Jablon, D.1
  • 21
    • 0032640752 scopus 로고    scopus 로고
    • Secure agreement scheme for gKk>q via password authentication
    • 27th May
    • T. Kwon and J. Song, “Secure agreement scheme for gKk>q via password authentication,” Electronics Letters, vol.35, no.11, pp.892-893, 27th May 1999
    • (1999) Electronics Letters , vol.35 , Issue.11 , pp. 892-893
    • Kwon, T.1    Song, J.2
  • 23
    • 84958601057 scopus 로고    scopus 로고
    • A key recovery attack on discrete log-based schemes using a prime order subgroup
    • C. Lim and P. Lee, “A key recovery attack on discrete log-based schemes using a prime order subgroup,” In CRYPTO, pp.249-263, 1997
    • (1997) In CRYPTO , pp. 249-263
    • Lim, C.1    Lee, P.2
  • 25
    • 0345686108 scopus 로고    scopus 로고
    • Open key exchange: how to defeat dictionary attacks without encrypting public keys
    • April 7-9
    • S. Lucks, “Open key exchange: how to defeat dictionary attacks without encrypting public keys,” The Workshop on Security Protocols, April 7-9, 1997
    • (1997) The Workshop on Security Protocols
    • Lucks, S.1
  • 28
    • 3142744801 scopus 로고    scopus 로고
    • On Diffie-Hellman key agreement with short exponents
    • P. van Oorschot and M. Wiener, “On Diffie-Hellman key agreement with short exponents,” In Eurocrypt 96, pp. 332-343, 1996
    • (1996) In Eurocrypt , vol.96 , pp. 332-343
    • van Oorschot, P.1    Wiener, M.2
  • 30
    • 85180809254 scopus 로고    scopus 로고
    • Strong Password-Based Authentication Using Pseudorandom Moduli
    • R. Perlman and C. Kaufman, “Strong Password-Based Authentication Using Pseudorandom Moduli,” IETF Internet Draft, 2000, available from http://search.ietf.org/internetdrafts/draft-perlman-strongpass-00.txt
    • (2000) IETF Internet Draft
    • Perlman, R.1    Kaufman, C.2
  • 31
    • 84919085619 scopus 로고
    • An improved al- (gorithm for computing logarithms over ø ù L * and its cryptographic significance
    • S. Pohlig and M. Hellman, “An improved al- (gorithm for computing logarithms over ø ù L * and its cryptographic significance,” IEEE Transactions on Information Theory, vol.24, no.1, pp.106-110, 1978
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.1 , pp. 106-110
    • Pohlig, S.1    Hellman, M.2
  • 32
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation GIHKJ L
    • J. Pollard, “Monte Carlo methods for index computation GIHKJ L,” Mathematics of Computation, vol.32, pp.918-924, 1978
    • (1978) Mathematics of Computation , vol.32 , pp. 918-924
    • Pollard, J.1
  • 33
    • 38149011042 scopus 로고    scopus 로고
    • Technical report from University of Cambridge and University of Hertfordshire
    • M. Roe, B. Christianson and D. Wheeler, “Secure sessions from weak secrets,” Technical report from University of Cambridge and University of Hertfordshire, 1998, available from http://www.ccsr.cam.ac.uk/techreports/tr4/index.html
    • (1998) Secure sessions from weak secrets
    • Roe, M.1    Christianson, B.2    Wheeler, D.3
  • 34
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • C. Schnorr, “Efficient identification and signatures for smart cards,” In CRYPTO 89, pp.239-251, 1989
    • (1989) In CRYPTO , vol.89 , pp. 239-251
    • Schnorr, C.1
  • 35
    • 0002839106 scopus 로고
    • Refinement and extension of encrypted key exchange
    • M. Steiner, G. Tsudik, and M. Waidner, “Refinement and extension of encrypted key exchange,” ACM Operating Systems Review, vol.29, no.3, pp.22-30, 1995
    • (1995) ACM Operating Systems Review , vol.29 , Issue.3 , pp. 22-30
    • Steiner, M.1    Tsudik, G.2    Waidner, M.3
  • 36
    • 0027834441 scopus 로고
    • Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks
    • G. Tsudik and E. van Herreweghen, “Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks,” In IEEE Computer Security Foundation Workshop, pp.136-142, 1993
    • (1993) In IEEE Computer Security Foundation Workshop , pp. 136-142
    • Tsudik, G.1    van Herreweghen, E.2
  • 37
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • June
    • V. Voydock and S. Kent, “Security mechanisms in high-level network protocols,” Computing Surveys, vol.15, no.2, pp.135-171, June 1983
    • (1983) Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.1    Kent, S.2
  • 39


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.