References
- M. Bellare, D. Jablon, H. Krawczyk, P. MacKenzie, P. Rogaway, R. Swaminathan and T. Wu,' Proposal for P1363 study group on password-based authenticated - key-exchange methods,' 2000
- S. Bellovin and M. Merritt, 'Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise,' ACM Conference on Computer and Communications Security, 1993 https://doi.org/10.1145/168588.168618
- S. Bellovin and M. Merrit, 'Encrypted key exchange: password-based protocols secure against dictionary attacks,' IEEE Symposium on Research in Security and Privacy, 1992 https://doi.org/10.1109/RISP.1992.213269
- V. Boyko, P. MacKenzie and S. Patel, 'Provably secure password authenticated key exchange using Diffie-Hellman,' 'Eurocrypt 00, 2000
- M. Bellare and P. Rogaway, 'The AuthA protocol for password-based authenticated key exchange,' 2000, available from http://www.cs.ucdavis.edu/rogaway/papers/autha.ps
- W. Diffie and M. Hellman, 'New directions in cryptography, IEEE Transactions on Information Theory, Vol. 22, No. 6, 1976 https://doi.org/10.1109/TIT.1976.1055638
- L. Gong, T. M. A. Lomas, R. M. Needham and J. H. Saltzer, 'Protecting poorly chosen from guessing attacks,' IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, 1993 https://doi.org/10.1109/49.223865
- N. Haller, 'The S/KEY one-time password system,' RFC 1760, 1995
- S. Halevi and H. Krawczyk, 'Public-key cryptography and password protocols,' ACM Transactions on Information and System Security(TISSEC), Vol. 2, 1999 https://doi.org/10.1145/322510.322514
- D. Jablon, 'Extended password key exchange protocols,' WETICE Workshop on Enterprise Security, 1997
- D.Jablon, 'Strong password-only authenticated key exchange,' ACM Computer Communications Review, vol. 26, No. 5, 1996 https://doi.org/10.1145/242896.242897
- T. Kwon, 'Authentication and key agreement via memorable password,' NDSS 2001 Symposium Conference Proceedings, 2001
-
T. Kwon, J. Song, 'Secure agreement scheme for
$g^{xy}$ via password authentication,' Electronics Letters, Vol. 35, No. 11, 1999 https://doi.org/10.1049/el:19990623 - P. MacKenzie, S. Patel and R. Swaminathan, 'Password-authenticated key exchange based on RSA,' ASIACRYPT, 2000
- 박왕석, 정종필,박창섭, 이동훈,'패스워드를 이용한 인증 프로토콜들에 대한 고찰,' 통신정보보호학회 학술지 제9권 제4호, 1999
- D. R. Stinson, Cryptography Theory and Practice, CRC, 1995
- M. Steiner, G. Tsudik, M. Waidner, 'Refinement and extension of encrypted key exchange,' ACM Operating Systems Review, Vol. 29, No. 3, 1995 https://doi.org/10.1145/206826.206834
- T. Wu, 'Secure remote password protocol,' NDSS, 1998