최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.18 no.5, 2008년, pp.17 - 30
권정옥 (고려대학교 정보경영공학전문대학원) , 김기탁 (고려대학교 정보경영공학전문대학원) , 정익래 (고려대학교 정보경영공학전문대학원) , 이동훈 (고려대학교 정보경영공학전문대학원)
In the paper, we consider password-based authenticated key exchange with different passwords, where the users do not share a password between themselves, but only with the server. The users make a session key using their different passwords with the help of the server. We propose an efficient passwo...
M. Abdalla, M. Bellare and P. Rogaway. "DHAES:an encryption scheme based on the Diffie-Hellman problem," Submission to IEEE P1363, 1998
M. Abdalla, M. Bellare and P. Rogaway. "The oracle Diffie-Hellman assumption and an analysis of DHIES," CT-RSA01, pp. 143-158, 2001
M. Abdalla, P.-A. Fouque, D. Pointcheval. "Password-Based Authenticated Key Exchange in the Three-Party Setting," In PKC'05, LNCS 3386, pp. 65-84, 2005
M. Abdalla and D. Pointcheval. "Interactive Diffie-Hellman assumptions with applications to password-based authentication," In Proc. of Financial Cryptography 2005, LNCS 3570, pp. 341-356, Springer-Verlag, 2005
J. W. Byun, I. R. Jeong, D. H. Lee, and C.-S. Park. "Password-Authenticated Key Exchange between Clients with Different Passwords," In ICICS'02, LNCS 2513, pp. 134-146, 2002
M. Bellare and P. Rogaway. "Random oracles are practical:a paradigm for designing efficient protocols," In Proc. of 1st Conference on Computer and Communications Security, pp. 62-73, ACM, 1993
M. Bellare, D. Pointcheval and P. Rogaway. "Authenticated key exchange secure against dictionary attack," In Eurocrypt 00, LNCS 1807, pp. 139-155, Springer-Verlag, 2000
M. Bellare and P. Rogaway. "Provably secure session key distribution - the three party case," In Pro. of the 28th Annual ACM Symposium on Theory of Computing, pp. 57-66, 1996
R. Canetti, O. Goldreich, and S. Halevi. "The random oracle methodology, revisited," In Pro. of the 32nd Annual ACM Symposium on Theory of Computing, pp. 209-218, 1998
R. Canetti, O. Goldreich and S. Halevi. "On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes," In Pro. of 1st Theory of Cryptography Conference (TCC), LNCS 2951, pp. 40-57, 2004
Y. Ding, P. Horster. "Undetectable on-line password guessing attacks," ACM Operating Systems Review 29 (4):77-86 (1995)
O. Goldreich and Y. Lindell. "Session-Key Generation using Human Passwords Only," In Pro. of Crypto '01, LNCS 2139, pp. 408-432. Springer-Verlag, 2001
S. Goldwasser and Y. Taumen. "On the (in)security of the Fiat-Shamir Paradigm," In Proc. of STOC '03, pp. 102-115, IEEE Computer Society, 2003
J. Katz, R. Ostrovsky, and M. Yung. "Forward secrecy in Password-only Key Exchange Protocols," In Pro. of SCN '02, LNCS 2576, pp. 29-44, Springer-Verlag, 2002
J. Katz, R. Ostrovsky, and M. Yung. "Efficient password-authenticated key exchange using human-memorable passwords," In Pro. of Eurocrypt'01, LNCS 2045, pp. 475-494, 2001
J. O. Kwon, I. R. Jeong, K. Sakurai, D. H. Lee, "Efficient Verifier-Based Password-Authenticated Key Exchange in the Three-Party Setting", Computer Standards & Interfaces, vol. 29 (5), pp. 513-520, 2007
C.-L. Lin, H.-M. Sun, M. Steiner, T. Hwang. "Three-party encrypted key exchange without server public-keys," IEEE Communication Letters 5 (12):497-499 (2001)
J. B. Nielsen. "Separating Random Oracle Proofs from Complexity Theoretic Proofs:The Non-Committing Encryption Case," In Proc. of CRYPTO'02, LNCS 2442, pp. 111- 126, 2002
M. Steiner, G. Tsudik, and M. Waidner. "Refinement and extension of encrypted key exchange," ACM SIGOPS Operating Systems Review, 29(3):22-30, July 1995
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.