References
- Chen TH, Lee WB. A new method for using hash functions to solve remote user authentication, Comput Electr Eng, v34 (1), pp.53-62, 2008. https://doi.org/10.1016/j.compeleceng.2007.01.001
- Yeh HT, Sun HM. Password authenticated key exchange protocols among diverse network domains, Comput Electr Eng, v31(3) pp.175-189, 2005. https://doi.org/10.1016/j.compeleceng.2005.03.001
- Ding Y, Horster P. Undetectable on-line password guessing attacks. ACM Operat Syst Rev v29 (4), pp.77-86, 1995. https://doi.org/10.1145/219282.219298
- Bellovin SM, Merritt M. Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings of the 1992 IEEE symposium on research in security and privacy, pp.72- 84, 1992. https://doi.org/10.1109/RISP.1992.213269
- Lee TF, Hwang T, Lin CL. Enhanced three-party encrypted key exchange without server public keys. Comput Secur, v23 (7), pp.571-577, 2004. https://doi.org/10.1016/j.cose.2004.06.007
- Wen HA, Lee TF, Hwang T. Provably secure three-party password-based authenticated key exchange protocol using weil pairing. IEE Proc Commun, v152 (2), pp.138-143, 2005. https://doi.org/10.1049/ip-com:20045087
- Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. ACM annual conference on computer and communications security, pp.62-73, 1993. https://doi.org/10.1145/168588.168596
- Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of the Crypto 93, LNCS, v773, pp.232-249, 1993. https://doi.org/10.1007/3-540-48329-2_21
- Bellare M, Rogaway P. Provably secure session key distribution: the three party case. In: Proceedings of the 27th ACM symposium on the theory of computing; pp.57-66, 1995. https://doi.org/10.1145/225058.225084
- Bellare M, Pointcheval P, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Proceedings of the Eurocrypt''00, LNCS, v1807, pp.139-155, 2000. https://doi.org/10.1007/3-540-45539-6_11
- Nam J, Lee Y, Kim S, Won D. Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inform Sci, v177(6), pp.1364-1375, 2007. https://doi.org/10.1016/j.ins.2006.09.001
- Lu R, Cao Z. Simple three-party key exchange protocol. Comput Secur , v26(1), pp.94-97, 2007. https://doi.org/10.1016/j.cose.2006.08.005
- Kim, Choi. Enhanced Password-based simple three-party Key exchange protocol. Computers and Electrical Engineering , v35(1), pp.107-114, 2009. https://doi.org/10.1016/j.compeleceng.2008.05.007