1 |
Teakyoung Kwon, 'Authentication and Key Agreement via Memorable Password,' IACR ePrint, 2000
|
2 |
Bruce Schneier, Applied Cryptography, pp.513-522, Wiley, 1995
|
3 |
Certicom Corp., 'Remarks on the security of the Elliptic curve cryptosystem,' http://www.certicom.com, 2000
|
4 |
Julio Lopez and Ricardo Dahab, 'Performance of Elliptic Curve Cryptosystems,' TR-IC-00-08, http://www.dcc.unicamp.br/ic-main/publications-e.html, 2000
|
5 |
S.Bellovin and M.Merritt, 'Encrypted Key Exchange: password-based protocols secure against dictionary attacks,' Proceeding of the 1992 IEEE Computer Society conference on Research in Security and Privacy, pp.72-84, 1992
DOI
|
6 |
Gareth Jones, 'Cryptography and Elliptic curves,' Project report of Univ. of Southampton, 1999
|
7 |
T.Wu, 'Secure Remote Password protocol,' Internet Society Symposium on Network and Distributed System Security, 1998
|
8 |
Alfred J. Menezes, Paul C.van Oorschot, and Scott A. Van stone, Handbook of Applied Cryptography, pp.49-125, CRC Press, 1997
|
9 |
Phil MacKenzie, 'More Efficient Password Authenticated Key Exchange,' RSA2001, 2001
|
10 |
Victor Boyko, Philip MacKenzie and Sarvar Patel, 'Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,' Eurocrypt2000,, 2000
|
11 |
NIST, 'Recommended Elliptic Curves for federal government use,' 1999
|
12 |
Don Johnson and Alfred Menezes, 'The Elliptic curve Digtal Signature Algorithm,' TR-CORR 99-34, Dept of C&O, University of Waterloo, 1999
|
13 |
SKIP, 'Assigned Numbers for SKIP Protocols', http://www.skip.org, 1998
|