References
- Communication of the ACM Timestamps in Key Distribution Systems D. Denning;G. Sacco
- ACM Computer Communication Review v.20 no.1 A Note on Redundancy in Encrypted Messages L. Gong
- Designs Codes and Cryptography v.2 Authentication and Authenticated Key Exchanges W. Diffie;P.C. Van Oorschot;M. Wiener
- In Proc. IEEE Computer Society Symposium on Research in Security and Privacy Encrypted Key Exchange : Password-Based Protocols Secure Against Dictionary Attacks Steven M. Bellovin;Michael Merritt
- IEEE Journal on Selected Areas in Communications v.11 no.5 Protecting poorly Chosen Secrets from Guessing Attack Li Gong;T. Mark;A. Lomas;Roger M. Needham;Jerome H. Saltzer
- Technical report Augmented Encrypted Key Exchange : Password-Based Protocols Secure Against Dictionary Attacks and Password File Compromise Steven M. Bellovin;Michael Merritt
- Operationg Systems Review v.29 no.2 Refinement and Extension of Encrypted Key Exchange Michael Stener;Gene Tsudik;Michael Waidner
- Computer Communication Review v.26 no.5 Strong Password-Only Authenticated Key Exchange David P. Jablon
- Advances in Cryptology-CRYPTO'96 Keying hash functions for message authentication M. Bellare;R. Cenetti;H. Krawczyk
- Proceedings of the Sixth Workshop on Enabling Technologies : Infrastructures for Collaborative Enterprises (WET-ICE'97) Extended Password Key Exchange Protocols immune to Dictionary Attacks David P. Jablon
- Handbook of Applied Cryptography A. Menezes;P. Van Oorschot;S. Vanstone
- Proceedings of the Fifth ACM Conference on Computer and Communications Security The Secure Remote Password Protocol Thomas Wu
- Proceedings of the Fifth ACM Conference on Computer and Communications Security Public-Key Crytography and password protocols S. Halevi;H. Krawczyk
- 암호이론과 보안 박창섭
- 암호이론과 보안 박창섭
- Elliptic Curve Cryptosystem Tutorials and WhitePapers Certicom Crop.