An E-Mail Protocol Providing Forward Secrecy without Using Certificated Public Keys |
Kwon, Jeong-Ok
(Graduate School of Information Management and Security CIST, Korea University)
Koo, Young-Ju (Graduate School of Information Management and Security CIST, Korea University) Jeong, Ik-Rae (Graduate School of Information Management and Security CIST, Korea University) Lee, Dong-Hoon (Graduate School of Information Management and Security CIST, Korea University) |
1 | 이창용, 김대영, 김상진, 오희국, "Signcryption 기반의 완전한 전방향 안전성을 제공하는 이메일 프로토콜," 한국정보보호학회 2006년도 하계학술대회, pp. 344-348, 2006년 6월 과학기술학회마을 |
2 | H.M. Sun, B.T. Hsieh, and H.J. Hwang, "Secure E-mail Protocols Providing Perfect Forward Secrecy," IEEE Communications Letters, vol. 9, no. 1, pp. 58-60, Jan. 2005 |
3 | E.J. Yoon and K.Y. Yoo, "Cryptanalysis of Robust E-Mail Protocols with Perfect Forward Secrecy," IEEE Communications Letters, vol. 11, no. 5, pp. 372-374, May 2007. DOI ScienceOn |
4 | B. Schneier, E-Mail Security with PGP and PEM: How to Keep Your Electronic Mail Private, John Wiley Press, Jan. 1995 |
5 | B.H. Kim, J.H. Koo, and D.H. Lee, "Robust E-Mail Protocols with Perfect Forward Secrecy," IEEE Communications Letters, vol. 10, no. 6, pp. 510-512, June 2006 DOI ScienceOn |
6 | A.W. Dent, "Flaws in an E-Mail Protocol of Sun, Hsieh, and Hwang," IEEE Communications Letters, vol. 9, no. 8, pp. 718-719, Aug. 2005 DOI ScienceOn |
7 | 김범한, 구재형, 이동훈, "완전한 전방향 안전성을 보장하는 이메일 프로토콜," 한국정보보호학회 충청지부 학술대회, pp. 37-48, 2005년 10월 |
8 | A. Bacard, The Computer Privacy Handbook: A Practical Guide to EMail Encryption, Data Protection, and PGP Privacy Software, Peachpit Press, Jan. 1995 |
9 | K. Kobara and H. Imai, "Pretty-simple password- authenticated key exchange under standard assumption," IEICE Transactions on Fundamentals, vol. E85-A, no. 10, pp. 2229-2237, Oct. 2002 |
10 | 이창용, 김대영, 심동호, 김상진, 오희국, "완전한 전방향 안전성을 제공하는 실용적인 저자우편 프로토콜," 정보보호학회논문지, 17(5), pp. 27-38, 2007년 10월 |