References
- W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Trans, Vol.IT-22, No.6, pp. 644-654, 1976. https://doi.org/10.1109/TIT.1976.1055638
- S. M. Bellovin and M. Merrit, "Encrypted key exchange: Password based protocols secure against dictionary attacks," Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992. https://doi.org/10.1109/RISP.1992.213269
- S.M. Bellovin and M. Merritt, "Augmented encrypted key exchange a password-based protocol secure against dictionary attacks and password file compromise," Technical report, AT&T Bell Laboratories, 1994.
- T. Kwon and J. Song, "Secure agreement scheme for gxy via password authentication," Electronics Letters Vol.35, No.11, pp. 892-893, 1999. https://doi.org/10.1049/el:19990623
- M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of Encrypted Key Exchange," ACM Operating Systems Review, Vol 29, No.3, pp. 22-30, 1995. https://doi.org/10.1145/206826.206834
- C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: Attacks and a solution," ACM Operating Systems Review, Vol.34, No.4, pp 12-20, 2000. https://doi.org/10.1145/506106.506108
- C. Lin, H. Sun, M. Steiner, and T. Hwang, "Three-party Encrypted Key Exchange Without Server Public-Keys," IEEE Communication Letters, Vol.5, No.12, pp. 497-499, 2001. https://doi.org/10.1109/4234.974498
- H. Sun, B. Chen, and T. Hwang, "Secure key agreement protocols for three-party against guessing attacks," The Journal of Systems and Software, Vol.75, pp. 63-68, 2005 https://doi.org/10.1016/j.jss.2003.11.017
- 전일수, "스마트카드를 이용한 3자 참여 인증된 키교환 프로토콜", 한국정보보호학회, 제16권, 제6호, pp. 73-80, 2006. 12.
- Manik Lal Das, Ashutosh Sacena, Ved P. Gulati, "A Daunamic ID-based Remote User Authentication Scheme," IEEE Trans. on Consumer Electronics, Vol.50, No.2, pp. 629-631, 2004. https://doi.org/10.1109/TCE.2004.1309441
- H.Y. Chien and C.H. Chen, "A remote authentication scheme preserving user," IEEE AINA'05, Vol.2, pp. 245-248, 2005. https://doi.org/10.1109/AINA.2005.54
- W.C. Ku, C.M. Chen, and H.L. Lee, "Cryptanalysis of a variant of Peyravian-Zunic' password authentication scheme," IEICE Trans. Commun., Vol.E86-B, No.5, pp. 1682-1684, 2003.3.
- H.M. Qiu, Y.X. Yang, and Z.M. Hu, "new mutual user authentication scheme using smart card," Application Research of Computers, No.12, pp. 103-105, 2005.
- Lanlan Hu, Yixian Yang, Xinxin Niu, "Improved Remote User Authentication Scheme Preserving User Anonymity," IEEE CNSR'07, pp. 323-328, 2007. https://doi.org/10.1109/CNSR.2007.38
- C. Shoba Bindu, P. Chandra Sekhar Reddy, B. Satyanarayana, "Imporoved Remote User Authentication Scheme Preserving User Anonymity," IJCSNS, Vol.8, No.3, 2008.3.
- 김세일, 천지영, 이동훈, "추적이 가능한 스마트카드 사용자 인증 기법", 한국정보보호학회, 제18권, 제5호, pp.31-39, 2008.10.
- 김세일, 이현숙, 이동훈, "익명성을 제공하는 스마트카드 사용자 인종 프로토콜", 한국정보보호학회, 제17권, 제2호, pp. 139-144, 2007.4.
- 강주성, "난수발생기의 현황 및 안전성 분석 기술 동향", 한국정보보호학회, 제16권, 제4호, pp. 23-46, 2006.8.
- 양형규, 안영화, "난수와 암호", 한국정보보호학회, 제2권, 제3호, pp. 67-80, 1992. 9.
- 김용훈, 윤택영, 박영호, "서버의 개입이 없는 스마트카드 기반의 3자간 키 교환 프로토콜", 한국정보보호학회, 제18권, 제2호, 2008.4.
Cited by
- A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System vol.14, pp.11, 2013, https://doi.org/10.5762/KAIS.2013.14.11.5872
- Zero-knowledge Based User Remote Authentication Over Elliptic Curve vol.2, pp.12, 2013, https://doi.org/10.3745/KTCCS.2013.2.12.517