1 |
P. MacKenzie, S. Patel, and R. Swaminathan, "Password-authenticated key exchange based on RSA," Advances in Cryptology, ASIACRYPT 2000 Proceedings, LNCS 1976, pp. 599-613, 2000
|
2 |
S.J. Park, J.H. Nam, S.J. Kim, and D.H. Won, "Efficient Password-Authenticated Key Exchange Based on RSA," CT-RSA, LNCS 4377, pp. 309–323, 2007
|
3 |
S.H. Shin, K. Kobara, and H. Imai, "RSA-based Password-Authenticated Key
Exchange,Revisited," IEICE TRANSACTIONS on Information and Systems, vol. E91-D, no. 5, pp. 1424-1438, May 2008
DOI
ScienceOn
|
4 |
R. Gennaro and Y. Lindell, "A framework for password-based authenticated key exchange," Ad-vances in Cryptology - EUROCRYPT 2003 Proceedings, LNCS 2656, pp. 524-542, 2003
|
5 |
A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, 4th Ed., CRC Press, Oct. 1996
|
6 |
S. Bellovin and M. Merritt, "Augmented encrypted key exchange : A passwordbased protocol secure against dictionary attacks and password file compromise," Proc. of the 1st ACM Conference on Computer and Communications Security, ACM, pp. 244-250, Nov. 1993
DOI
|
7 |
M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attack," Advances in Cryptology - EUROCRYPT 2000 Proceedings, LNCS 1807, pp. 139-155, 2000
|
8 |
D. Catalano, D. Pointcheval, and T. Pornin, "Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication," IACR 2007, pp. 115-149, Jan. 2007
DOI
|
9 |
S. Lucks, "Open key exchange: How to defeat dictionary attacks without encrypting public keys," Proc. of Security Protocol Workshop, LNCS 1361, pp. 79-90, 1997
|
10 |
S. Bellovin and M. Merritt, "Encrypted key exchange : Password-based protocols secure against dictionary attacks," Proc. of the IEEE Symposium on Research in Security and Privacy, pp. 72-84, May 1992
DOI
|
11 |
D.M. Burton, Elementary number theory, 6th Ed., McGraw-Hill Higher Education, 2007
|
12 |
M. Zhang, "New approaches to password authenticated key exchange based on RSA," Proc. of Asiacrypt, LNCS 3329, pp. 230-244, 2004
|
13 |
F. Zhu, D.S. Wong, A.H. Chan, and R. Ye, "Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks," In Proc. of ISC 2002, LNCS 2433, pp. 150-161, 2002
|
14 |
D.S. Wong, A.H. Chan, and F. Zhu, "More Effcient Password Authenticated Key Exchange Based on RSA," In Proc. of INDOCRYPT 2003, LNCS 2904, pp. 375-387, 2003
|
15 |
T.Y. Youn, Y.H. Park, C.H. Kim, and J. Lim, "Weakness in a RSA-based password authenticated key exchange protocol," Inf. Process. Lett, vol. 108, no. 6, pp. 339-342, Nov. 2008
DOI
ScienceOn
|