2Byun JW,Jeong IR,Lee DH,et al.Password-authenticated key exchange between clients with different passwords.In:hfonnation and Communications Security-ICICS 2002,Springer,LNCS,2513:134~146
3Diffie W,Hellman ME.New directions in cryptography.IEEE Transactions on Information Theory,1976,22(6):644~654
4Bellovin SM,Merritt M.Encrypted key exchange:Password-based protocols secure against dictionary attacks.In:Proceedings of the 1992 IEEE Symposium on Security and Privacy,IEEE Computer Society Press,1992,72~84
5Boyko V,MacKenzie PD,Patel S.Provably secure password-authenticated key exchange using diffie-hellman.In:Advances in Cryptology-EUROCRYPT 2000,Springer,LNCS,1807:156~171
6MacKenzie PD.More efficient password-authenticated key exchange.In:Topics in Cryptology-CT-RSA 2001,Springer,LNCS,2020:361~377
7MacKenzie PD.The pak suite:Protocols for password-authenticated key exchange.In:Submission to IEEE P1363.2,2002
8Bellare M,Rogaway P.The autha protocol for password-based authenticated key exchange.In:Contribution to the IEEE P1363 study group,2000
9Bresson E,Chevassut O,Pointcheval D.Security proofs for an efficient password-based key exchange.In:Proceedings of the 10th ACM Conference on Computer and Communications Security-CCS 2003,ACM,2003,241~250