User menu

Improvements to Mitchell's remote user authentication protocol

Bibliographic reference Goyal, Vipul ; Quisquater, Jean-Jacques ; Jain, Abhishek. Improvements to Mitchell's remote user authentication protocol.8th International Conference on Information Security an Cryptology (ICISC 2005) (Seoul(South Korea), Dec 01-02, 2005). In: Lecture Notes in Computer Science, Vol. 3935, p. 69-80 (2006)
Permanent URL
  1. Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
  2. Bellare, M., Canetti, R., Krawczyk, H.: HMAC: Keyed-Hashing for Message Authentication. RFC 2104 (February 1997)
  3. Berson, T.A., Gong, L., Lomas, T.M.A.: Secure, Keyed and Collisionful Hash Functions. Technical Report SRI-CSL-94-08 (May 1994)
  4. Bicakci Kemal, Tsudik Gene, Tung Brian, How to construct optimal one-time signatures, 10.1016/s1389-1286(03)00285-8
  5. Bleichenbacher Daniel, Maurer Ueli M., Directed Acyclic Graphs, One-way Functions and Digital Signatures, Advances in Cryptology — CRYPTO ’94 ISBN:9783540583332 p.75-82, 10.1007/3-540-48658-5_9
  6. Bleichenbacher, D., Maurer, U.M.: Optimal Tree-Based One-time Digital Signature Schemes. In: Puech, C., Reischuk, R. (eds.) STACS 1996. LNCS, vol. 1046, pp. 363–374. Springer, Heidelberg (1996)
  7. Bleichenbacher Daniel, Maurer Ueli, On the efficiency of one-time digital signatures, Lecture Notes in Computer Science (1996) ISBN:9783540618720 p.145-158, 10.1007/bfb0034843
  8. Mitchell Chris J., Chen Liqun, Comments on the S/KEY user authentication scheme, 10.1145/240799.240801
  9. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22 (6), 74–84 (1976)
  10. Haller, N.: The S/Key One-Time Password System. In: Proceedings of the ISOC Symposium on Network and Distributed System Security, pp. 151–157 (February 1994)
  11. Haller, N.: The S/KEY One-Time Password System, RFC 1760 (1995)
  12. Haller, N.: A One-Time Password System, RFC 1938 (May 1996)
  13. Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, RFC 2289 (February 1998)
  14. Kaufman, C., Perlman, R., Speciner, M.: Network Security, Private Communication in a Public World. Prentice Hall Series (2002)
  15. Lamport, L.: Constructing Digital Signatures from a One-Way Function, Technical Report CSL-98, SRI International (1978)
  16. Lamport Leslie, Password authentication with insecure communication, 10.1145/358790.358797
  17. McDonald, D.L., Atkinson, R.J., Metz, C.: One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong Authentication. In: Proc. of the 5th USENIX UNIX Security Symposium (June 1995)
  18. Menzees, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
  19. Merkle Ralph C., A Digital Signature Based on a Conventional Encryption Function, Advances in Cryptology — CRYPTO ’87 (1988) ISBN:9783540187967 p.369-378, 10.1007/3-540-48184-2_32
  20. Merkle Ralph C., A Certified Digital Signature, Advances in Cryptology — CRYPTO’ 89 Proceedings ISBN:9780387973173 p.218-238, 10.1007/0-387-34805-0_21
  21. Mitchell, C.J.: Authentication of a remote user to a host in a data communication system, UK patent application filed (November 3, 2001)
  22. Mitchell Chris J., Remote User Authentication Using Public Information, Cryptography and Coding (2003) ISBN:9783540206637 p.360-369, 10.1007/978-3-540-40974-8_28
  23. Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public-key cryptosystems, 10.1145/359340.359342
  24. Mobile VCE,