1 |
Barry Jaspan, 'Dual workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks,' Sixth USENIX UNIX Security Symposium, July 1996
|
2 |
Steven M. Bellovin, Michael Merritt, 'Augmented Encrypted Key and Exchange : a Password-Based Protocol Secure Against Dictionary Attacks Password File Compromise,' ACM Conference on Computer and Communications Security, 1993
DOI
|
3 |
Thomas Wu, 'The Secure Remote Password Protocol,' 1998 Internet Society Network and Distributed System Security Symposium, San Diego, March 1998, pp.97-98
|
4 |
S.M.Bellovin and M.Merritt, 'Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attack,' Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy, Oakland, May 1992
DOI
|
5 |
Shai Halevi, Hugo Krawczyk, 'public-key cryptography and password protocols,' ACM Transactions on Information and System Security, Vol.2, No.3, August 1999, pp. 230-268
DOI
|
6 |
B. Schneier, 'Applied Cryptography, 2nd Edition,' John Wiley & Sons, 1995, pp.52-55
|
7 |
Thomas Wu, 'The Secure Remote Password Protocol,' in Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, San Diego, CA, March 1998, pp.97-111
|
8 |
W. Stalling, 'Cryptography and Network Security,' Prentice-Hall, 1999, pp.303-311
|
9 |
Peter Buhler and Thomas Eirich, 'Secure Password Based Cipher Suite for TLS,' Proc. of the Symposium on Network and Distributed Systems Security Symposium, February 2000
|
10 |
David Jablon, 'Public Key Methods for Shared Secret Authentication,' RSA '98 Crypto Track Talk, January 14, 1998, http://www.integritysciences.com/rsa98/sld034.html
|