참고문헌
- Chin-Chen Chang, Tzong-Chen Wu and Chi-Sung Laih, Cryptanalysis of a password authentication scheme using quadradic residues. Computer communications, Vol. 18 No. 1, January 1995, pp 45-47 https://doi.org/10.1016/0140-3664(94)00592-6
- C.S. Laih, L. Harn and D. Huang, Password authentication using public-key encryption, Proceeding of 1983 International Carnahan Conference on Security Technology, Zurich, Switzerland, October 1987, pp 35-38
- Chin-Chen Chang, Wen-Yuan Liao, Remote password authentication scheme based upon ElGamal's signature schemem, Computers & Security, Vol. 13, No. 2, Apr, 1994, pp 137-144 https://doi.org/10.1016/0167-4048(94)90063-9
- Chun-Li Lin, Tzonelih Hwang, A password authentication scheme with secure password updating, Computers and Security, Vol. 22 No. 1, 2003, pp 68-72 https://doi.org/10.1016/S0167-4048(03)00114-7
- Lei Fan, Jian-Hua Li, Hong-Wen Zhu, An enhancement of timestamp-based password authentication scheme, Computers and Security, Vol. 21 No. 7, 2002, pp 665-667 https://doi.org/10.1016/S0167-4048(02)01118-5
- A. Menezes, P. Van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. Boca Raton, FL: CRC Press, 1997
- 원동호, 현대암호학 2004년 3월
- 정보보호진흥원 암호인증기술팀, SEED 알고리즘을 이용한 개인키 암호화 기술규격[v1.00], 정보보호진흥원, 2004
- The MD5 Message-Digest Algorithm, http://www.ietf.org/rfc/rfc1321.txt
- PasswordsPro, Inside Pro, http://www.insidepro.com/eng/passwordspro.shtml
- 마이크로소프트의 패스워드 설정 원칙, http://www.microsoft.com/athome/security/privacy/password.mspx
- 미국 NIST 전자인증 가이드라인 표준, NIST Special Publication 800-63 - AppendixA http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf
- The SANS Institute, Password Protection Policy Standards Organization, http://www.sans.org/resources/policies/Password_Policy.pd