|
1. X. Wang and H. Yu, “How to Break MD5 and Other Hash Functions,” available at http://www.infosec.sdu.edu.cn/paper/md5-attack.pdf . 2. S. William,“Cryptography and Network Security Principles and Practice,”Prentice Hall, Third Edition 2002. 3. T.C. Yeh, H.Y. Shen, and J.J. Hwang,“A secure one-time password authentication scheme using smart cards,”IEICE Trans. Commun., vol.E85-B, no.11, pp.2515-2518, Nov. 2002. 4. T. Tsuji and A. Shimizu, “Cryptanalysis on one-time password authentication scheme using counter value,” IEICE Trans. Commun., vol.E87-B, no.6, pp.2756-2759, June. 2004. 5. W.C. Ku, H.C. Tsai and M.J. Tsaur, “Stolen-verifier attack on an efficient smartcard-based one-time password authentication scheme,” IEICE Trans. Commun., vol.E87-B, no.8, pp.2374-2376, Aug. 2004. 6. I.S. You and K. Cho, “Cryptanalysis of Yeh-Shen-Hwang’s one-time password authentication scheme*,” IEICE Trans. Commun., vol.E88-B, no.2, pp.751-753, Feb. 2005. 7. D.H. Yum and P.J. Lee, “Comments on Yeh-Shen-Hwang’s one-time password authentication scheme,” IEICE Trans. Commun., vol.E88-B, no.4, pp.1647-1648, Apr. 2005. 8. N.Y. Lee and J.C. Chen, “Improvement of One-Time Password Authentication Scheme Using Smart Cards,” IEICE Trans. Commun., vol.E88-B, no.9, pp.3765-3767, Sep. 2005. 9. L. Lamport, “Password authentication with insecure communication,” Commun. ACM, vol.24, no.11, pp.770-772, Nov. 1981. 10. N.M. Haller, “On internet authentication,” RFC 1704, Oct 1994. 11. N.M. Haller, “The S/KEY one-time password system,” RFC 1760, Feb. 1995. 12. C.J. Mitchell and L. Chen, “Comments on the S/KEY user authentication scheme,” ACM Operating Systems Review, vol.30, no.4, pp.12-16, Oct. 1996. 13. S.M. Yen and K.H. Liao, “Shared authentication token secure against replay and weak key attacks,” Information Processing Letters, vol.62, pp.77-80, 1997. 14. T. Tsuji and A. Shimizu, “One-time password authentication protocol against theft attacks,” IEICE Trans. Commun., vol.E87-B, no.3, pp.523-529, March 2004. 15. H.Y. Chien, R.C. Wang and C.C. Yang, “Note on robust and simple authentication protocol,” The Computer Journal vol.48, no.1, pp.27-29, Jan. 2005. 16. A. Shimizu, “A dynamic password authentication method by one-way function,” IEICE Trans. Int. & Syst. (Japanese Edition), vol.J73-D-I, no.7, pp.630-636, July 1990. 17. A. Shimizu, “A dynamic password authentication method by one-way function,” Syst. Comput. Jpn., vol.22, pp.32-40, July 1991. 18. A. Shimizu, T. Horioka and H. Inagaki “A password authentication method for contents communication on the Internet,” IEICE Trans. Commun., vol.E81-B, no.8, pp.1666-1673, Aug. 1998. 19. M. Sandirigama, A. Shimizu and M.-T. Noda, “Simple and secure password authentication protocol (SAS),” IEICE Trans. Commun., vol.E83-B, no.6, pp.1363-1365, June 2000. 20. C. Lin, H. Sun and T. Hwang, “Attacks and solutions on strong-password authentication,” IEICE Trans. Commun., vol.E84-B, no.9, pp.2622-2627, Sept. 2001. 21. T. Kamioka and A. Shimizu, “The examination of the security of SAS one-time password authentication,” IEICE Technical Report, OFS2001-48, Nov. 2001. 22. C.-M. Chen and W.-C. Ku, “Stolen-verifier attack on two new strong-password authentication protocols,” IEICE Trans. Commun., vol.E85-B, no.11, pp.2519-2521, Nov. 2002. 23. H.Y. Chien, J.K. Jan, “Robust and simple authentication protocol,” The Computer Journal vol.46, no.2, pp.193-201, Feb. 2003. 24. T. Tsuji and A. Shimizu, “An impersonation attack on one-time password authentication protocol OSPA,” IEICE Trans. Commun., vol.E86-B, no.7, pp.2182-2185, July 2003. 25. T. Tsuji, T. Kamioka and A. Shimizu, “Simple and secure password authentication protocol, ver.2 (SAS-2),” IEICE Technical Report, OIS2002-30, Sept. 2002. 26. T. Tsuji and A. Shimizu, “Algorithm variations of SAS-2,” IEICE Technical Report, IN2002-149, Dec. 2002. 27. W.H. Yang and S.P. Shieh, “Password authentication schemes with smart cards,” Computers & Security, vol.18, no.8, pp.727-733, 1999. 28. W.C. Ku and S.M. Chen, “Cryptanalysis of a flexible remote user authentication scheme using smart cards,” ACM SIGOPS Operating Systems Review, vol.39, issue 1, pp.90-96, Jan. 2005. 29. W.C. Ku and S.M. Chen, “Weakness and improvement of an efficient password based remote user authentication scheme using smart cards,” IEEE Trans. on Consumer Electronics, vol.50, no.1, pp.204-207, Feb. 2004. 30. H.T. Yeh, “Improvement of an efficient and practical solution to remote authentication: smart card,” IEICE Trans. Commun., vol.E89-B, no.1, pp.210-211, Jan. 2006. 31. H.M. Sun, “An efficient remote user authentication scheme using smart cards,” IEEE Trans. on Consumer Electronics, vol.46, no.4, pp.958-961, Nov. 2000. 32. H.Y. Chien, J.K. Jan and Y.M. Tseng, “An efficient and practical solution to remote authentication: smart card,” Comput. Secur., vol.21, no.4, pp.372-375, 2002. 33. C.C. Lee, M.S. Hwang and W.P. Yang, “A flexible remote user authentication scheme using smart cards,” ACM Operating Systems Review, vol.36, no.3, pp.46-52, July 2002. 34. 賴溪松,韓亮,張真誠,2003,近代密碼學及其運用,旗標出版股份有限公司。 35. C.C. Chang, J.Y. Kuo and J.S. Lee, “Time-bound based password authentication scheme,” cw, pp.117-122, 2005 International Conference on Cyberworlds(CW’05), 2005. 36. 巫坤品、王青青譯,2006,密碼學與網路安全原理與實務,碁峯資訊股份有限公司。
|