최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 정보통신, v.31 no.3, 2004년, pp.252 - 258
류은경 (경북대하교 컴퓨터공학과) , 윤은준 (경북대하교 컴퓨터공학) , 유기영 (경북대하교 컴퓨터공학과)
In this paper, we propose a new authenticated key exchange protocol in which client and sever can mutually authenticate and establish a session key over an insecure channel using only a human memorable password. The proposed protocol is based on Diffie-Hellman scheme and has many of desirable securi...
S. Blake-Wilson, A. Menezes, Authenticated Diffie Hellman key agreement protocols, Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC '98), LICS Vol. 1556, pp. 339-361, 1999
D. Jablon, Strong Password-Only Authenticated Key Exchange,Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, pp.5-26, 1996
T. Wu, Secure remote password protocol, Internet Society Symposium on Network and Distributed System Security, 1998
T. Kwon, Ultimate solution to authentication via memorable password, Contri- bution to the IEEE P1363 study group for Future PKC Standards, available from http://grouper.ieee.org/groups/1363/passwdPK/contributions.html 2000
P. MacKenzie, More Efficient Password Authenticated Key exchange, CT-RSA, LNCS Vol. 2020, pp.361-377, 2001
D. Johnson and S. Blake-Wilson and A. Menezes, Key agreement protocols and their security analysis, Proceedings of the Sixth IMA international Conference on Cryptography and Coding, LNCS Vol. 1355 pp. 30-45, 1997
W. Diffie, M. Hellman, New directions in cryptography, IEEE Transaction on Information Theory, IT-22, pp.644-654, 1976
M. Bellare and P.Rogaway, Entity Authentication and Key Distribution, In Proc. of Crypto '93, LNCS Vol. 773, pp. 232-249, 1993
V. Boyko, P. Mackenzie and S. Patel, Provably secure password authenticated key exchange using diffie-Hellman, In Proc. of EuroCrypt 2000, pp.156-171, 2000
D. Denning and G. Sacco, Timestamps in key distrobution systems, Communications of the ACM, 1981
L. Gong, M. Lomas, R. Needham, and J. Saltzer, Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, pp 648-656, 1993
※ AI-Helper는 부적절한 답변을 할 수 있습니다.