R. R. Jueneman, S. M. Matyas, C. H. Meyer, "Message Authentication", Sep. 1985, vol. 23, No. 9, pp. 29-40. |
R. Bird, et al., "Systematic Design of a Family of Attack-Resistant Authentication Protocols", Jun. 1993, pp. 1-28. |
Steven M. Bellovin, Michael Merritt, "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks", pp. 1-13. |
T. Mark A. Lomas, et al. "Reducing Risks from Poorly Chosen Keys", pp. 14-18. |
Li Gong, et al. "Protecting Poorly Chosen Secrets from Guessing Attacks", Sep. 25, 1992, pp. 1-18. |
Refik Molva, et al., "Research Report, KryptoKnight Authentication and Key Distribution System", Apr. 1, 1992, pp. 1-17. |