1 |
T. Wu. 'Secure remote password protocol,' Internet Society Symposium on Network and Distributed System Security, 1998
|
2 |
P. MacKenzie, S. Patel, and R. Swaminathan. 'Password-authenticated key exchange based on RSA.' In ASIACRYPT2000
|
3 |
M. Bellare and P. Rogaway, 'The AuthA protocol for password-based authenticated key exchange,' Presented to IEEE P1363a, March 2000
|
4 |
W. Diffie, M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, Vol.IT-22, No.6, pp.644-654, 1976
DOI
|
5 |
D. R. Stinson, Cryptography Theory and Practice, CRC, 1995
|
6 |
M. Bellare and P. Rogaway, 'Random oracles are practical: A paradigm for designing efficient protocols,' In ACM security 93, pp.62-73, 1993
DOI
|
7 |
M. Bellare and P. Rogaway, 'Entity Authentication and Key Distribution,' Advances in Cryptology-CRYPTO'93, Vol. 773, pp.232-249, 1994
|
8 |
IEEE. Standard Specifications for Public Key Cryptography, IEEE1363, 2002
|
9 |
V. Boyko, P. MacKenzie and S. Patel. 'Provably Secure Password- Authenticated Key Exchange Using Diffie-Hellman,' Advances in Cryptology-EUROCRYPT'2000, pp. 156-171, 2000
|
10 |
T. Kwon. 'Ultimate Solution to Authentication via Memorable Password,' Presented to IEEE P1363a, May 2000
|
11 |
D. Jablon. 'Extended password key exchange protocols,' WETICE Workshop on Enterprise Security, 1997
|