참고문헌
- S. Bellovin and M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' IEEE Comp. Society Symp. on Research in Security and Privacy, 1992, pp. 7284 https://doi.org/10.1109/RISP.1992.213269
- D. Jablon, 'Strong password-only authenticated key exchange,' ACM Comp. Comm. Review, 1996, Vol. 26, No. 5, pp. 526 https://doi.org/10.1145/242896.242897
- S. Bellovin and M. Merrit, 'Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and passwrod file compromise,' ACM Conference on Comp. and Comm. Security, 1993, pp. 244-250 https://doi.org/10.1145/168588.168618
- D. Jablon, 'Extended Password Key Exchange Protocols Immune to Dictionary Attacks,' Proc. of WET-ICE '97, IEEE Computer society, June, 1997, Cambridge, MA, pp. 248-255 https://doi.org/10.1109/ENABL.1997.630822
- T. Wu, 'Secure Remote Password Protocol,' Internet Society Symp. Network ad Distributed System Security, 1998
- M. Bellare, D. Pointcheval and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 139-155
- V. Boyko, P. Mackenzie and S. Patel, 'Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 156-171
- P. MacKenzie, S. Patel and R. Swaminathan, 'Password-Authenticated Key Exchange Based on RSA,' Proceedings of Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 599-613
- J. Katz, R. Ostrovsky and M. Yung, 'Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords,' Proceedings of Euro-crypt 2001, Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 475-494
- U. Feige, A. Fiat and A. Shamir, 'Zero-knowledge proofs of indentity,' Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 77-94 https://doi.org/10.1007/BF02351717
- L.C. Guillou and J.J. Quisquater, 'Protocol fitted to security microprocessor minimizing both transmission and memory,' Proceedings of EuroCrypt 88, Lecture Notes in Computer Science, Springer-Verlag, 1988, pp. 123-128 https://doi.org/10.1007/3-540-45961-8_11
- C.P. Schnorr, Efficient Identification and Signatures for Smart cards, Advances in Cryptology : Proceedings of Crypt 89, Lecture Notes in Computer Science, Springer-Verlag, New York, 1989, pp. 239-251