References
- S. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks," in Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84, 1992.
- M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," in Proceedings of Eurocrypt' 00, LNCS vol. 1807, pp. 139-155, 2000.
- V. Boyko, P. MacKenzie, and S. Patel, "Provably secure password-authenticated key exchange using Diffie-Hellman," in Proceedings of Eurocrypt' 00, LNCS vol. 1807, pp. 156-171, 2000.
- M. Zhang, "New approaches to password authenticated key exchange based on RSA," in Proceedings of Asiacrypt'04, LNCS vol. 3329, pp. 230-244, 2004.
- M. Abdalla and D. Pointcheval, "Simple passwordbased encrypted key exchange protocols," in Proceedings of CT-RSA'05, LNCS vol. 3376, pp. 191-208, 2005.
- J. Katz, R. Ostrovsky, and M. Yung, "Efficient and secure authenticated key exchange using weak passwords," Journal of the ACM, vol. 57, no. 1, pp. 78-116, 2009.
- J. Katz and V. Vaikuntanathan, "Round-optimal password-based authenticated key exchange," in Proceedings of TCC'11, LNCS vol. 6597, pp. 293-310, 2011.
- M. Steiner, G. Tsudik, and M. Waidner, "Refinement and extension of encrypted key exchange," ACM SIGOPS Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995. https://doi.org/10.1145/206826.206834
- C. Lin, H. Sun, and T. Hwang, "Three-party encrypted key exchange: attacks and a solution," ACM SIGOPS Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000. https://doi.org/10.1145/506106.506108
- M. Abdalla, P. Fouque, and D. Pointcheval, "Password-based authenticated key exchange in the three-party setting," in Proceedings of PKC'05, LNCS vol. 3386, pp. 65-84, 2005.
- R. Lu, Z. Cao, "Simple three-party key exchange protocol," Computers & Security, vol. 26, no. 1, pp. 94-97, 2007. https://doi.org/10.1016/j.cose.2006.08.005
- K. Yoneyama, "Efficient and strongly secure password-based server aided key exchange," in Proceedings of Indocrypt'08, LNCS vol. 5365, pp. 172-184, 2008.
- J. Steiner, C. Newman, and J. Schiller, "Kerberos: an authentication service for open network systems," in Proceedings of 1998 USENIX Winter Conference, pp. 191-202, 1998.
- J. Zhao and D. Gu, "Provably secure three-party password-based authenticated key exchange protocol," Information Sciences, vol. 184, no. 1, pp. 310-323, 2012. https://doi.org/10.1016/j.ins.2011.07.015
- D. Cash, E. Kiltz, and V. Shoup, "The twin Diffie-Hellman problem and applications," in Proceedings of Eurocrypt'08, LNCS vol. 4965, pp. 127-145, 2008.
- M. Bellare and P. Rogaway, "Random oracles are practical: A paradigm for designing efficient protocols," in Proceedings of 1st ACM Conference on Computer and Communications Security, pp. 62-73, 1993.
- R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," in Proceedings of Eurocrypt'01, LNCS vol. 2045, pp. 453-474, 2001.
- J. Nam, J. Paik, U. Kim, and D. Won, "Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks," Information Sciences, vol. 177, no. 23, pp. 5441-5467, 2007. https://doi.org/10.1016/j.ins.2007.06.002
- K. Choo, C. Boyd, Y. Hitchcock, and G. Maitland, "On session identifiers in provably secure protocols," in Proceedings of 4th Conference on Security in Communication Networks, LNCS vol. 3352, pp. 351-366, 2005.