References
- V. Boyko, P. MacKenzie. and S. Patel, 'Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman.' Advances in Cryptology-EUROCRYFT' 2000, LNCS 1807, pp. 156-171 (2000)
- T. Kwon, 'Ultimate Solution to Authentication via Memorable Password,' IEEE P1363.2 Working Group, Available at http://grouper .ieee.org/groups/1363/passwdPK/submissions.html#amp(2000)
- T. Kwon, 'Authentication and key agreement via memorable passwords,' In Proceedings of the ISOC Network and Distributed System Security (NDSS) Symposium (2001)
- Y. Hwang. D. Yum, and P. Lee. 'EPA: An efficient password-based protocol for authenticated key exchange,' Information Security and Privacy. 8th Australasian Conference, ACISP'2003, LNCS 2727, pp. 324-335 (2003)
- T. Kwon, 'Addendum to Summary of AMP,' IEEE P1363.2 Working Group, Available at http://grouper.ieee.org/groups/1363/passwdPK/contributions/ampsummary2.pdf (2003)
- S. Bellovin and M. Merritt, 'Encryted key exchange: password-based protocols secure against dictionary attacks,' Proceedings of IEEE Comp. Society Symp. on Research in Security and Privacy, pp. 72-84 (1992)
- T. Wu, 'Secure remote password protocol,' Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, pp. 97-111(1998)
- P. MacKenzie and R. Swaminathan, 'Secure Network Authentication with Password Identification,' Presented to IEEE P1363.2, Available at http://grouper.ieee.org/groups/1363/passwdPK/contributions.html#MS (1999)
- M. Bellare and P. Rogaway, 'The AuthA protocol for password-based authenticated key exchange,' IEEE P1363.2 Working Group, Available at http://grouper. ieee.org/groups/1363/passwdPK/conributi ons.html#autha (2000)
- P. MacKenzie, T. Shrimpton, and M. Jakobsson, 'Threshold Password-Authenticated Key Exchange,' Advances in Cryptology-CRYPTO'2002, LNCS 2442, pp. 369-384 (2002) https://doi.org/10.1007/3-540-45708-9_24
- Xunhua Wang, 'Intrusion Tolerant Password-Enabled PKI,' Proceedings of 2nd annual PKI Research Workshop, Available at http://middleware.internet2.edu/pki03/PKI03-proceedings. html (2002)
- T. Kwon, 'Refinement and Improvement of Virtual Software Token Protocols,' IEEE Communications Letters, Vol. 8, No.1. pp. 75-77 (2004) https://doi.org/10.1109/LCOMM.2003.822523
- W. Ford and B. Kaliski, 'Server-Assisted Generation of a Strong Secret from a Password,' IEEE P1363.2 Working Group, Available at http://grouper. ieee. org/groups/1363/passwdPK/ contributions,html#FK00 (2000)
- 이정현, 김현정, 이동훈, '다중서버를 이용한 인증된 키교환 프로토콜,' 정보보호학회논문지 13권 1호, pp. 87-98 (2003)
- M. Bellare, D. Pointcheval. and P. Rogaway, 'Authenticated Key Exchange Secure Against Dictionary Attack,' Advances in Cryptology-EUROCRYPT '2000, LNCS 1807, pp. 139-155 (2000)
- S. Blake-Wilson, A. Menezes, 'Authenticated Diffie-Hellman Key Agreement Protocols,' Selected Areas in Cryptography' 98-SAC'98, LNCS 1556. pp, 339-361 (1998)
- R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, 'Robust Threshold DSS Signatures,' Advances in Cryptology-EUROCRYPT' 96, LNCS 1070, pp. 354-371 (1996)
- D. Chaum and T. Pedersen, 'Wallet databases with observer,' Advances in Cryptology-CRYPTO'92, LNCS 740, pp, 89-105 (1992)
- R. Gennaro, Michael O. Rabin, and T. Rabin, 'Simplified VSS and Fasttrack Multiparty Computations with Application to Threshold Cryptography,' Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing-PODC'98. pp, 101-111 (1998)
- Ho-Sun Yoon, Heung-Youl Youm, 'A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA,' Information Security and Cryptology-ICISC' 99, LNCS 1787, pp, 208-220 (1999)
- Ueli Maurer and Stefan Wolf. 'Diffie-Hellman, Decision Diffie-Hellman, and Discrete Logarithms,' Proceedings of IEEE International Symposium on Information Theory Society-ISIT' 1998, pp. 327 (1998)
- D. Boneh, 'The decision Diffie-Hellman problem,' Algorithmic Number Theory, Third International Symposium-ANTS- III, LNCS 1423, pp. 48-63(1998)
- A. Menezes, P. van Oorschot, S. Vanston 'Handbook of applied cryptography,' CRC Press, Inc., pp 618 (1997)