최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.18 no.2, 2008년, pp.11 - 20
김용훈 (고려대학교 정보경영공학전문대학원 정보보호학과) , 윤택영 (고려대학교 정보경영공학전문대학원 정보보호학과) , 박영호 (세종사이버대학교)
Three-party key exchange protocol is a cryptographic protocol which permits two clients share a common session key using different passwords by the help of a trusted server. In a three-party key exchange protocol, an user remember only one password which shared with a trusted server for establish a ...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
전일수, "스마트카드를 이용한 3자 참여 인증된 키교환 프로토콜", 정보보호학회논문지, 제16권제6호, pp. 73-80, 2006
J.Baek, R.Safavi-Naini, W.Susilo, "Certificateless public key encryption without pairing", ISC 2005, Springer-Verlog, LNCS vol.3650, pp.134148, 2005
SM.Bellovin, M.Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks", Proceedings of the IEEE Symposium on Research in Research in Security and Privacy, pp.72-84, 1992
SM.Bellovin, M.Merritt, "Augmented encrypted key exchange: a password- based protocol secure against dictionary attacks and password file compromise", Technical report, AT&T Bell Laboratories, 1994
V.Boyko, P.MacKenzie, S.Patel, "Provably secure password authenticated key exchange using Diffie- Hellman", In B. Preneel, editor, Advances in Cryptology-Eurocrypt 2000, Springer-Verlag, LNCS vol.1807, pp. 156-171, 2000
H. Chung, W. Ku, "Three weaknesses in a simple three-party key exchange protocol", Information Sciences, vol.178, pp.220-229, 2008
C. Clavier, M. Joye, "Universal Exponentiation Algorithm, A First Step towards Provable SPA-Resistance", CHES 2001, Springer-Verlag, LNCS vol.2162, pp.300-308, 2001
M.Das, A.Saxena, V.Gulati, D.Phatak, "A novel remote user authentication scheme using bilinear pairings", Computer and Security, vol.25, no.3, pp.184-189, 2006
W.Diffie, M.E.Hellman, "New directions in cryptography", IEEE Trans., vol.IT-22, no.6, pp.644-654, 1976
L.Gong, M.Lomas, R.Needham, J.Saltzer, "Protecting poorly chosen secrets from guessing attacks", IEEE Journal on Selected Areas in Communications, vol. 11 , no.5, pp.648-656, 1993
S.Halevi, H.Krawczyk, "Public-key cryptography and password protocols", ACM Transactions on Information and System Security, vol.2, no.3, pp.230-268, 1999
D.Jablon, "Strong password-only authenticated key exchange", ACM Computer Conununication Review, vol.26, no.5, pp.5-26, 1996
W. Jaung, "Efficient Three-Party Key Exchange Using Smart Cards", Consumer Electronics, IEEE Transactions on, vol.50, pp.619-624, 2004
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", CRYPTO 96, Springer-Verlag, LNCS vol.1109, pp.104-113, 1996
H. Krawczyk, T. Rabin, "Chameleon Signatures", In Symposium on Network and Distributed Systems Security (NDSS'00), pp.143-154, 2000, Internet Society
T.Kwon, J.Song, "Secure agreement scheme for $g^{xy} $ via password authentication", Electronics Letters, vol.35, no.11, pp.892-893, 1999
T. Lee, T .Hwang, C. Lin, "Enhanced three-party encrypted key exchange without server public keys", Computer & Security, vol.23, pp.571-577, 2004
R. Lu, Z. Cao, "Simple three-party key exchange protocol", Computers & Security, vol.26, no.1, pp.94-97, 2007
N. McCullagh, P.S.L.M. Barreto, "A New Two-Party Identity-Based Authe- nticated Key Agreement", CT-RSA 2005, SpringerVerlag, LNCS vol.3376, pp.262-274, 2005
C.Schnorr, "Efficient identification and signatures for smart cards", Crypto'89, pp.239-252, 1990.
A.Shamir, Y.Tauman, "Improved Online/Offline Signature Schemes", CRYPTO 2001, Springer-Verlag, LNCS vol.2139, pp.355-367, 2001
E.Yoon, W.Lee, K.Yoo, "Secure remote user authentication scheme using bilinear pairings", WISTP 2007, Springer-Verlag, LNCS vol.4462, pp.102-114,2007
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.