References
- E. Bach, Algorithmic Number Theory, Volumn 1: Efficient Algorithms, MIT Press, Cambridge Massachusetts, 1996
- M.J. Beller and Y. Yacobi, 'Limitations of the kerberos authentication system', computer Communication Review, Vol. 20, pp. 119-132, 1990 https://doi.org/10.1145/381906.381946
- H. Cohen, A Course in Computational Algebraic Number Theory Springer-Verlag, Berlin, 1993
- U. Feige, A. Fiat and A. Shamir, 'Zero Knowledge proof of identity', Journal of Cryptology, Vol.1, pp. 77-94, 1983 https://doi.org/10.1007/BF02351717
- A. Fiat and A. Shamir, 'How to prove yourself: Practical solutions to identification and signature problems', Advances in Cryptology-CRYPTO' 86, LNCS 263, pp. 186-194, 1987
- K. Gaarder and E. Snekkenes, 'Applying a formal analysis technique to the CCITT X. 509 strong two way authentication protocol', Journal of Cryptology, Vol.3, pp. 81-98, 1991
- L. Gong, 'A security risk of depending on synchronized clocks', Operating System Review, Vol.26, pp. 49-53, 1992 https://doi.org/10.1145/130704.130709
- L. C. Guillou and J. -J. Quisquater, 'A practical zero-knowledge protocol to security microprocessor minimizing both transmission and memory', Advances in Cryptology-EUROCRYPT '88, LNCS 330, pp. 123-128, 1988
- L. Lamport, 'Password authentication with insecure communication', Communications of the ACM, Vol.24, pp. 770-772, 1981 https://doi.org/10.1145/358790.358797
- R. Morris and K. Thompson, 'Password security : a case history', Communications of the ACM, Vol.22, pp. 594-597, 1979 https://doi.org/10.1145/359168.359172
- H. Woll, 'Reductions among number theoretic problems', Information and Computation, Vol. 72, pp. 167-179, 1987 https://doi.org/10.1016/0890-5401(87)90030-7
- Jong-Min Park, Yong-Hun Kim, Beom-Joon Cho, 'Password System Enhancing the Security against', The Korean Institute of Maritime Information & Communication Science, Vol. 8, No.8, pp. 1790-1795, 2004
- Jong-Min Park, 'Efficient and Secure Authenticated Key Exchange', The Korean Institute of Maritime Information & Communication Science, Vol. 3, No. 3, pp. 163-166, 2005