Katz J,Ostrovsky R,Moti Y.Efficient and secure authenticated key exchange using weak passwords[J].Journal of the ACM,2009,57(1):1-39.
[2]
Halevi S,Krawczyk H.Public-key cryptography and password protocols[J].ACM Transactions on Information and System Security,1999,2(3):230-268.
[3]
Bellovin S M,Merritt M.Encrypted key exchange:password based protocols secure against dictionary attacks[A].Proceedings of IEEE S&P 1992[C].Washington DC,USA:IEEE,1992.72-84.
[4]
Patel S.Number theoretic attacks on secure password schemes[A].Proceedings of IEEE S&P 1997[C].Washington DC,USA:IEEE,1997.236-247.
[5]
Youn T Y,Park Y H,Kim C,Lim J.Weakness in a RSA-based password authenticated key exchange protocol[J].Information Processing Letters,2008,108(6):339-342.
[6]
Zhang Mu-Xiang.New approaches to password authenticated key exchange based on RSA[A].Proceedings of Asiacrypt 2004[C].Berlin:Springer-Verlag,LNCS,Vol 3329,2004.230-244.
[7]
Wei Fu-Shan,Ma Chuan-Gui,Cheng Qing-Feng.Anonymous gateway-oriented password-based authenti-cated key exchange based on RSA[J].EURASIP Journal on Wireless Communications and Networking,2011,2011:162-173.
[8]
Bellare M,Pointcheval D,Rogaway P.Authenticated key exchange secure against dictionary attacks[A].Proceedings of Eurocrypt 2000[C].Berlin:Springer-Verlag,LNCS,Vol 1807,2000.139-155.
[9]
Park S,Nam J,Kim S,Won D.Efficient password authenticated key exchange based on RSA[A].Proceedings of CT-RSA 2007[C].Berlin:Springer-Verlag,LNCS,Vol 4377,2007.309-323.
[10]
魏福山,马传贵,程庆丰.基于RSA的网关口令认证密钥交换协议[J].计算机学报,2011,34(1):38-46. Wei Fu-Shan,Ma Chuan-Gui,Cheng Qing-Feng.Gateway oriented password authenticated key exchange based on RSA[J].Chinese Journal of Computers,2011,34(1):38-46.(in Chinese)
[11]
Abdalla M,Chevass O,Fouque P,Pointcheval D.A simple threshold authenticated key exchange from short secrets[A].Proceedings of Asiacrypt 2005[C].Berlin:Springer-Verlag,LNCS,Vol 3788,2005.566-584.
[12]
Abdalla M,Fouque P,Pointcheval D.Password-based authenticated key exchange in the three-party setting[A].Proceedings of PKC 2005[C].Berlin:Springer-Verlag,LNCS,Vol 3386,2005.65-84.
[13]
Wang Gui-Lin,Yu Jiang-Shan,Xie Qi.Security analysis of a single sign-on mechanism for distributed computer networks[J].IEEE Transactions on Industrial Informatics,2013,9(1):294-302.
[14]
Dolev D,Yao A C.On the security of public key protocols[J].IEEE Transactions on Information Theory,1983,29(12):198-208.
[15]
Florencio D,Herley C.A large-scale study of web password habits[A].Proceedings of WWW 2007[C].Passau:ACM Press,2007.657-666.
[16]
Bonneau J.The science of guessing:analyzing an anonymized corpus of 70 million passwords[A].Proceedings of IEEE S&P 2012[C].Washington DC,USA:IEEE,2012.538-552.