Remark on the Security of Password Schemes
![]() |
이희정 (강남대학교 응용수학) |
1 |
Standard Specifications for Public Key Cryptography: Password-based Techniques
/
|
2 |
Entity authentication and key distribution
/
|
3 |
/
|
4 |
Strong Password-only authenticated key exchange
/
DOI ScienceOn |
5 |
P.Mackenzie
/
|
6 |
Password-authenticated key exchange based on RSA
/
|
7 |
/
|
8 |
Factoring polyomial with integer coefficients
/
|
9 |
/
|
10 |
/
|
11 |
Reconstructing truncated integer variables satisfying linear congruences
/
DOI ScienceOn |
12 |
Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password-file compromise
/
|
13 |
/
|
14 |
Provably secure password-authenticated key exchange
/
DOI |
15 |
Authenticated key exchange secure against dictionary attacks
/
|
16 |
Authenticationand key agreement via memorable passwords
/
|
17 |
Secure remote password protocol
/
|
18 |
Lattice Reduction: A Toolbox for the Cryptanalyst
/
DOI ScienceOn |
19 |
Encrypted key exchange: Paaword based protocol secure against dictionary attacks
/
|
20 |
On formal models for secure key exchange
/
|
21 |
A Modular approach to the design and analysis of anthentication and key exchange protocols
/
|
22 |
Open key exchange: How to defeat dictionary attacks without encrypting public keys
/
|
23 |
the art of computer programming
/
|
![]() |