1 |
S. Blake-Wilson, A. Menezes, Authenticated Diffie Hellman key agreement protocols, Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC '98), LICS Vol. 1556, pp. 339-361, 1999
|
2 |
S. Bellovin and M. Merritt, Encrypted key exchange: Password-based protocols secure aganist dictionary attacks, In IEEE Symposium on Research in Security and Privacy, pp.72-84, 1992
DOI
|
3 |
D. Jablon, Strong Password-Only Authenticated Key Exchange,Computer Communication Review, ACM SIGCOMM, vol. 26, no. 5, pp.5-26, 1996
DOI
|
4 |
T. Wu, Secure remote password protocol, Internet Society Symposium on Network and Distributed System Security, 1998
|
5 |
T. Kwon, Ultimate solution to authentication via memorable password, Contri- bution to the IEEE P1363 study group for Future PKC Standards, available from http://grouper.ieee.org/groups/1363/passwdPK/contributions.html 2000
|
6 |
L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone, An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, pp. 119-134, 2003
DOI
|
7 |
D. Jablon, Extended password key exchange protocols immune to dictionary attack, WETICE Workshop, pp.248-255, 1997
DOI
|
8 |
P. MacKenzie, More Efficient Password Authenticated Key exchange, CT-RSA, LNCS Vol. 2020, pp.361-377, 2001
|
9 |
W. Diffie, M. Hellman, New directions in cryptography, IEEE Transaction on Information Theory, IT-22, pp.644-654, 1976
DOI
|
10 |
D. Johnson and S. Blake-Wilson and A. Menezes, Key agreement protocols and their security analysis, Proceedings of the Sixth IMA international Conference on Cryptography and Coding, LNCS Vol. 1355 pp. 30-45, 1997
|
11 |
L. Gong, M. Lomas, R. Needham, and J. Saltzer, Protecting poorly chosen secrets from guessing attacks, IEEE Journal on Selected Areas in Communications, pp 648-656, 1993
DOI
ScienceOn
|
12 |
M. Bellare and P.Rogaway, Entity Authentication and Key Distribution, In Proc. of Crypto '93, LNCS Vol. 773, pp. 232-249, 1993
|
13 |
V. Boyko, P. Mackenzie and S. Patel, Provably secure password authenticated key exchange using diffie-Hellman, In Proc. of EuroCrypt 2000, pp.156-171, 2000
|
14 |
D. Denning and G. Sacco, Timestamps in key distrobution systems, Communications of the ACM, 1981
|