1 |
T. Wu, 'Secure Remote Password Protocol,' Internet Society Symp. Network ad Distributed System Security, 1998
|
2 |
V. Boyko, P. Mackenzie and S. Patel, 'Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 156-171
|
3 |
P. MacKenzie, S. Patel and R. Swaminathan, 'Password-Authenticated Key Exchange Based on RSA,' Proceedings of Asiacrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 599-613
|
4 |
J. Katz, R. Ostrovsky and M. Yung, 'Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords,' Proceedings of Euro-crypt 2001, Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 475-494
|
5 |
L.C. Guillou and J.J. Quisquater, 'Protocol fitted to security microprocessor minimizing both transmission and memory,' Proceedings of EuroCrypt 88, Lecture Notes in Computer Science, Springer-Verlag, 1988, pp. 123-128
DOI
|
6 |
U. Feige, A. Fiat and A. Shamir, 'Zero-knowledge proofs of indentity,' Journal of Cryptology, Vol. 1, No. 2, 1988, pp. 77-94
DOI
|
7 |
C.P. Schnorr, Efficient Identification and Signatures for Smart cards, Advances in Cryptology : Proceedings of Crypt 89, Lecture Notes in Computer Science, Springer-Verlag, New York, 1989, pp. 239-251
|
8 |
S. Bellovin and M. Merrit, 'Encrypted key exchange: password based protocols secure against dictionary attacks,' IEEE Comp. Society Symp. on Research in Security and Privacy, 1992, pp. 7284
DOI
|
9 |
M. Bellare, D. Pointcheval and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks,' Proceedings of EuroCrypt 2000, Lecture Notes in Computer Science, Springer-Verlag, 2000, pp. 139-155
|
10 |
D. Jablon, 'Strong password-only authenticated key exchange,' ACM Comp. Comm. Review, 1996, Vol. 26, No. 5, pp. 526
DOI
|
11 |
D. Jablon, 'Extended Password Key Exchange Protocols Immune to Dictionary Attacks,' Proc. of WET-ICE '97, IEEE Computer society, June, 1997, Cambridge, MA, pp. 248-255
DOI
|
12 |
S. Bellovin and M. Merrit, 'Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and passwrod file compromise,' ACM Conference on Comp. and Comm. Security, 1993, pp. 244-250
DOI
|