References
- The PAK suites : Protocols for Password-Authenticated Key Exchange P. MacKenzie
- RSA Conference, Cryptographer's Track More Efficient Password-Authenticated Key Exchange P. MacKenzie
- Proceedings of the Symposium on Security and Privacy Encrypted key exchange: Password-based protocols secure against dictionary attacks S. Bellovin;M. Merritt
- Advances in Cryptology Eurocrypt'00, Lecture Notes in Computer Science v.1807 Provably secure password-authenticated key exchange using Diffie-Hellman V. Boyko;P. MacKenzie;S. Patal
- Advances in Cryptology Eurocrypt'00, Lecture Notes in Computer Science v.1807 Authenticated key exchange secure against dictionary attacks M. Bellare;D. Pointcheaval;P. Rogaway
- Advances in Cryptology Asiacrypt'00, Lecture Notes in Computer Science v.1976 Password-authenticated key exchange based on RSA P. MacKenzie;S. Patal;R. Swaminathan https://doi.org/10.1007/3-540-44448-3_46
- Advances in Cryptology Eurocrypt'01, Lecture Notes in Computer Science v.2045 Efficient password-authenticated key exchange using human-memorable passwords J. Katz;R. Ostrovsky;M. Yung
- Advances in Cryptology Crypto'01, Lecture Notes in Computer Science v.2139 Session-key generation using human passwords only O. Goldreich;Y. Lindell;J. Killian(ed.) https://doi.org/10.1007/3-540-44647-8_24
- STOC'87 How to Play Any Mental Geme, or a Completeness Theorem for protocols with an Honest Majority O. Goldreich;S. Micali;A. Wigderson
- Advances in Cryptology Crypto'00, Lecture Notes in Computer Science v.435 On-Line/Off-Line Digital Signatures S. Even;O. Goldreich;S. Micali
- Advances in Cryptology Crypto'98, Lecture Notes in Computer Science v.1462 A Practical Public Key Cryptosystem Provably Secure Against Chosen Ciphertext Attack R. Cramer;V. Shoup https://doi.org/10.1007/BFb0055717
- Math. Comp. v.48 Elliptic curve cryptosystems N. Koblitz https://doi.org/10.2307/2007884
- Advances in Cryptology Crypto'85, Lecture Notes in Computer Science v.218 Use of elliptic curves in cryptography V. Miller https://doi.org/10.1007/3-540-39799-X_31
- LMS Lecture Note Series 265 Elliptic Curves in Cryptography I. F. Blake;G. Seroussi;N. P. Smart
- Advances in Cryptology Crypto'01, Lecture Notes in Computer Science v.2139 Faster Point Multiplication in Cryptology R. P. Gallant;J. L. Lambert;S. A. Vanstone https://doi.org/10.1007/3-540-44647-8_11
- Advances in Cryptology Crypto'00, Lecture Notes in Computer Science v.1807 The XTR public key system A. Lenstra;E. Verheul https://doi.org/10.1007/3-540-45539-6_12
- Advances in Cryptology Asiacrypt'00, Lecture Notes in Computer Science v.1807 Key improvements to XTR A. Lenstra;E. Verheul https://doi.org/10.1007/3-540-45539-6_12
- Seminumerical Algorithms(second edition) v.2 The art of computer programming D.E. Knuth
- Advances in Cryptology Asiacrypt'00, Lecture Notes in Computer Science v.1807 Key improvements to XTR A. Lenstra;E. Verheul https://doi.org/10.1007/3-540-45539-6_12
- Computer Communication Review, v.26 no.5 Strong Password-Only Authenticated Key Exchange D. Jablon https://doi.org/10.1145/242896.242897
- Proceedings of the Sixth Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WET-ICE '97) IEEE Computer Society Extended Password Key Exchange Protocols Immune to Dictionary Attacks D. Jablon
- Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium The Secure Remote Password Protocol T. Wu
- submission to P1363 T. Kwon