References and Links
- [HA94]
- N. Haller and R. Atkinson,
"On Internet Authentication",
RFC 1704, Naval Research Laboratory, October 1994.
- [Jablon96]
- D. Jablon,
"Strong Password-Only
Authenticated Key Exchange",
ACM Computer Communications Review, October 1996.
- [BM89]
- S. M. Bellovin and M. Merritt,
"Limitations of the Kerberos Authentication System",
Proceedings of the 1991 USENIX Conference, Dallas, TX 1991.
- [BM92]
- S. M. Bellovin and M. Merritt,
"Encrypted Key Exchange: Password-Based
Protocols Secure Against Dictionary Attacks", Proceedings of the 1992
IEEE Computer Society Conference on Research in Security and Privacy,
May 1992.
- [BM94]
- S. M. Bellovin and M. Merritt,
"Augmented Encrypted Key Exchange: a
Password-Based Protocol Secure Against Dictionary Attacks and Password
File Compromise", AT&T Bell Laboratories (c. 1994).
- [STW95]
- M. Steiner, G. Tsudik, and M. Waidner,
"Refinement and
Extension of Encrypted Key Exchange",
ACM Operating Systems Review, Vol. 29, No. 3, July 1995.
- [DS81]
- D. Denning and G. Sacco, "Timestamps in Key Distribution Systems", Communications of the ACM, August 1981.
- [Sch96]
- B. Schneier, "Applied Cryptography", 2nd ed., John Wiley & Sons, 1996.
SRP on the Net
Other Crypto Resources
Back