[1] 冯登国,陈伟东.基于口令的安全协议的模块化设计与分析[J].中国科学:E辑,2007,50(3):381-398.[2] 秦小龙,杨义先.强口令认证协议的组合攻击[J].电子学报,2003,31(7):1043-1045.[3] TSAI C S, LEE C C, HWANG M S. Password authentication schemes: Current status and key issues [J]. International Journal of Network Security, 2006, 3(2): 101-115.[4] CHANG C C, WU T C. Remote password authentication with smart cards [J]. IEE Proceedings-E Computers and Digital Techniques, 1993, 138(3): 165-168.[5] LEE N Y, CHIU Y C. Improved remote authentication scheme with smart card [J]. Computer Standards and Interfaces, 2005, 27(2): 177-180.[6] LIAO I E, LEE C C, HWANG M S. A password authentication scheme over insecure networks [J]. Journal of Computer and System Sciences, 2006, 72(4): 727-740.[7] GIRI D, SRIVASTAVA P D. An improved remote user authentication scheme with smart cards using bilinear pairings [EB/OL]. [2011-11-20]. http://eprint.iacr.org/2006/274.pdf.[8] KOCHER P, JAFFE J, JUN B. Differential power analysis [C]// Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, LNCS 1666. Berlin: Springer, 1999: 388-397.[9] MESSERGES T S, DABBISH E A, SLOAN R H. Examining smart-card security under the threat of power analysis attacks [J]. IEEE Transactions on Computers, 2002, 51(5): 541-552.[10] 许春香,唐安阳.使用双线性对构造的智能卡口令认证方案[J].电子科技大学学报,2008,37(5):733-736.[11] 张鑫,李方伟,潘春兰.一种增强的基于智能卡的远程身份鉴别方案[J].计算机应用,2009,29(4):950-952.[12] 潘春兰,周安民,肖丰霞,等.对Liao等人身份鉴别方案的分析与改进[J].计算机工程与应用,2010,46(4):110-112.[13] 邓粟,王晓峰.基于双线性对的智能卡口令认证改进方案[J].计算机工程,2010,36(18):150-152.[14] WU SHUHUA, ZHU YUEFEI, PU QIONG. Robust smart-cards-based user authentication scheme with user anonymity [J]. Security and Communication Networks, 2012, 5(2): 236-248.[15] WANG R C, JUANG W S, LEI C L. Robust authentication and key agreement scheme preserving the privacy of secret key [J]. Computer Communications, 2011, 34(3): 274-280.[16] HALEVI S, KRAWCZYK H. Public-key cryptography and password protocols [J]. ACM Transactions on Information and System Security, 1999, 2(3): 230-268. |