Browse > Article

강화된 키 교환 프로토콜의 안전성 모델의 관한 연구  

Byun, Jin-Wook (평택대학교 정보통신학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bellare and P. Rogaway, "Provably secure session key distribution-the three party case", ACM symposium in theory of computing, 1995.
2 M. Bellare and P. Rogaway, "Entity authentication and key distribution", In proceedings of Crypto 1993, LNCS Vol. 773, pp. 232-249. Springer-Verlag, 1994.
3 H. Krawczyk, HMQV: A High-Performance Secure Diffie-Hellman Protocol", Advances in Cryptology, Crypto'05, LNCS 3621, pp. 546-566, Springer-Verlag, 2005.
4 R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels, Advances in Cryptology, Eurocrypt'01, pp. 453-474, Springer-verlag, 2001.
5 M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks", In proceedings of Eurocrypt 2000, LNCS Vol.1807, pp. 139-155, Springer-Verlag, 2000.
6 S. Blake-Wilson, D. Jhonson, and A. Menezes, "Key agreement protocols and their security analysis", In proceedings of IMA international conference, LNCS Vol. 1361, pp. 30-45, Springer-Verlag, 1997.
7 K.-K.R. Choo C. Boyd and Y. Hitchcock, Examining Indistinguishability complexity proofs for protocols, Advances in Cryptology, Asiacrypt'05, LNCS 3788, pp. 624-643, Springer-Verlag, 2005
8 S. Chatterjee, A. Menezes, B. Ustaoglu, "Reusing static keys in key agreement protocols", Indocrypt'09, LNCS 5922, pp. 39-56, Springer-Verlag, 2009.
9 B. LaMacchia, K. Lauter and A. Mityagin, "Stronger security of authenticated key exchange", ProvSec'07, LNCS 4784, pp. 1-16, Springer-Verlag, 2007.