References
- Proceedings of the IEEE Symposium on Research in Security and Privacy Encrypted Key Exchange : Password-Based Protocols Secure Against Dictionary Attacks S.M.Bellovin;M.Merritt
- Contribution to the IEEE P1363 study group The AuthA Protocol for Password-Based Authenticated Key Exchange M.Bellard;P.Rogaway
- IEEE P1363.2 Standard Specifications for Public Key Crytogragphy : Password-based Techniques
- IEEE Trans.Inform.Theory.IT-24(1) An improved algorithm for computing logarithms over GF(p) and its cryptocraphic signigicance S.C.Pohlig;M.E.Hellman
- Communications of the ACM D.E.Denning;G.M.Sacco
- Advances in Cryptology-Crypto'90 A key distribution paradox Y.Yacobi
- Computer Communications Review. ACM SIGCOMM v.26 no.5 Strong Password-Only Authenticated Key Exchange D.P.Jablon
- Proceedings of the First ACM Conference on Computer and Communication Security Augmented Encrypted Key Exchangd: a Password-Based Protocol Secure Against Dictionary Attadks and Password File Compromise S.M.Bellovin;M.Merritt
- ACM Operating Systems Review v.29 no.3 Refinement and Extension of Encrypted Key Exchange M.Steiner;G.Tsudik;M.Waidner
- Communi-cations of the ACM Time-stamps in key distribution protocols D.E.Denning;G.M.Sacco
- In Advances in Cryptology-Eurocrypt'96 On Diffie-Hellman Key Agreement with Short Exponents P.C.van Oorschot;M.J.Wiener
- Advances in Cryptology-Asiacrypt'96 Minding your p's and q's R.Anderson;S.Vaudenay
- In WETICE '97 Enterprise Security Workshop. Cambridge.MA Extended Password Key exchange Protocols Immune to Dictionary Attack D.P.Jablon
- Internet Society Symposium on Network and Distributed System Security The Secure Remote Password Protocol T.Wu