1 |
S. H. Shin, K. Kobara, and H. Imai 'Leakage-Resilient Authenticated Key Establishment Protocols', In Proc. of ASIACRYPT 2003. LNCS 2894, pp. 155-172, Springer-Verlag, 2003
|
2 |
Phoenix Technologies Inc., 'Research Papers on Strong Password Authentication', available at http://www.integritysciences. com/links. html
|
3 |
D. Boneh. 'The Decision Diffie-Hellman problem', In Proc. of the Third Algorithmic Number Theory Symposium. 1998
|
4 |
A. Shamir, 'How to Share a Secret', In Proc. of Communications of the ACM, Vol. 22(1l), pp. 612-613, 1979
DOI
ScienceOn
|
5 |
M. Bellare and P. Rogaway, 'Entity Authentication and Key Distribution', In Proc. of CRYPTO '93, LNCS 773, pp. 232-249, Springer-Verlag, 1993
|
6 |
P. MacKenzie, T. Shrimpton, and M. Jakobsson, 'Threshold PasswordAuthenticated Key Exchange', In Proc. of CRYPTO 2002, LNCS 2442, pp, 385-400, Springer-Verlag, 2002
|
7 |
M. D. Raimondo and R. Gennaro, 'Provably Secure Threshold PasswordAuthenticated Key Exchange', In Proc. of EUROCRYPT 2003, LNCS 2656, pp. 507-523, Springer-Verlag, 2003
|
8 |
M. Bellare, D. Pointcheval. and P. Rogaway, 'Authenticated Key Exchange Secure against Dictionary Attacks', In Proc. of EUROCRYPT 2000, LNCS 1807, pp. 139-155, Springer-Verlag, 2000
|
9 |
S. M. Bellovin and M. Merritt, 'Encrypted Key Exchange : Passwordbased Protocols Secure against Dictioinary Attacks', In Proc. of IEEE Symposium on Security and Privacy, pp. 72-84, 1992
|
10 |
A. Frier, P. Karlton, and P. Kocher, 'The SSL 3.0 Protocol', Netscape Communications Corp., 1996, available at http://wp.netscape.com/eng/ss13/
|
11 |
IETF (Internet Engineering Task Force), 'Secure Shell (secsh) Charter', available at http://www.ietf.org/html. charters/secsh-charter. html
|
12 |
IETF (Internet Engineering Task Force), 'Transport Layer Security (tis) Charter', availabel at http:// www.ietf.org/html.charters/tIs-charter. html
|
13 |
H. Krawczyk, M. Bellare, and R. Canetti, 'HMAC : Keyed-Hashing for Message Authentication', IETF RFC 2104, 1997, available at http://www. ietf.org/rfc /rfc2104.txt
|
14 |
IEEE Std 1363-2000, 'IEEE Standard Specifications for Public Key Cryptography', Main Document, pp, 53-57, IEEE, August 29, 2000
|
15 |
M. Naor and M. Yung, 'Universal One-Way Hash Functions and Their Cryptographic Applications', In Proc. of STOC '98, pp. 33-43, 1998
|
16 |
IEEE PI363.2, 'Standard Specifications for Password-based Public Key Cryptographic Techniques', Draft version 12, December 9, 2003
|