최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 시스템 및 이론, v.33 no.1/2, 2006년, pp.110 - 118
정익래 (고려대학교 정보보호센터) , 이동훈 (고려대학교 정보보호대학원)
Cryptographic protocol design in a two-party setting has of tel ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channel). In particular, most protocols for two-party key exchange have been designed assuming that parties alternate sending ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Adv. in Cryptology-Crypto '93
S. Blake-Wilson, D. Johnson, and A. Menezes. Key Agreement Protocols and their Security Analysis. 6th IMA Intl, Conf. on Cryptography and Coding, 1997
D. Denning and G. M. Sacco. Timestamps in Key Distribution Protocols. Comm. ACM 24(8): 533-536 (1981)
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography 2(2): 107-125 (1992)
W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory 22(6): 644-654 (1976)
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone. An Efficient Protocol for Authenticated Key Agreement. Technical report CORR 98-05, University of Waterloo, 1988
T. Matsumoto, Y. Takashima, and H. Imai. On Seeking Smart Public-Key Distribution Systems. Trans. of the IECE of Japan, E69, pp.99-106, 1986
National Security Agency. SKIPJACK and KEA Algorithm Specification. Version 2.0, May 29, 1998
S. Blake-Wilson and A. Menezes. Authenticated Diffie-Hellman Key Agreement Protocols. Selected Areas in Cryptography, 1998
R. Ankney, D. Johnson, and M. Matyas. The Unified Model. Contribution to ANSI X9F1, October 1995
C. Boyd and J.M.G. Nieto. Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography, 2003
J. Katz and M. Yung. Scalable Protocols for Authenticated Group Key Exchange. Adv. in Cryptology - Crypto 2003
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key agreement secure against dictionary attacks. In Proc. of EUROCRYPT '00
G. Ateniese, M. Steiner, and G. Tsudik. New Multi-Party Authentication Services and Key Agreement Protocols. IEEE J. on Selected Areas in Communications 18(4): 628-639 (2000)
M. Bellare, A. Boldyreva, and S. Micali. PublicKey Encryption in a Multi-User Setting: Security Proofs and Improvements. Adv. in Cryptology Eurocrypt 2000
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic Design of Two-Party Authentication Protocols. IEEE J. on Selected Areas in Communications 11(5): 679-693 (1993)
C. Boyd. On Key Agreement and Conference Key Agreement. ACISP 1997
E. Bresson, O. Chevassut, and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange-The Dynamic Case. Adv. in CryptologyAsiacrypt 2001
E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. Adv. in Cryptology- Eurocrypt 2002
M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. Advances in Cryptology - Eurocrypt '94
R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Adv. in Cryptology - Eurocrypt 2002
I. Ingemarasson, D.T. Tang, and ex. Wong. A Conference Key Distribution System. IEEE Trans. on Information Theory 28(5): 714-720 (1982)
M. Just and S. Vaudenay. Authenticated Multi-Party Key Agreement. Adv. in CryptologyAsiacrypt '96
V. Shoup. On Formal Models for Secure Key Exchange. Available at http://eprint.iacr.org
W.-G. Tzeng. A Practical and Secure-FaultTolerant Conference-Key Agreement Protocol. Public Key Cryptography, 2000
※ AI-Helper는 부적절한 답변을 할 수 있습니다.