-
1
-
-
0016092372
-
-
Commun. ACM, 17,8,pp. 437-442, 1974.
-
A. Evans, W. Kantrowitz, and E. Weiss, "A user authentication scheme not requiring secrecy in the computer," Commun. ACM, 17,8,pp. 437-442, 1974.
-
W. Kantrowitz, and E. Weiss, "A User Authentication Scheme Not Requiring Secrecy in the Computer,"
-
-
Evans, A.1
-
2
-
-
84909705258
-
-
UNIX Programmer's Manual, Seventh Edition, 2B, 1979.
-
A. Morris and K. Thompson, "Password security: A case history," UNIX Programmer's Manual, Seventh Edition, 2B, 1979.
-
"Password Security: a Case History,"
-
-
Morris, A.1
Thompson, K.2
-
4
-
-
0002950689
-
-
IEICE Trans. , vol. J70-D, no. 7, pp. 1413-1423, July 1987.
-
A. Shimizu and S. Miyaguchi, "Fast data encipherment algorithm FEAL," IEICE Trans. , vol. J70-D, no. 7, pp. 1413-1423, July 1987.
-
"Fast Data Encipherment Algorithm FEAL,"
-
-
Shimizu, A.1
Miyaguchi, S.2
-
5
-
-
0023830454
-
-
ECL Review, vol. 36, no. 4, pp. 433-437, 1988.
-
S. Miyaguchi, A. Shiraishi, and A. Shimizu, "Fast data encipherment Algorithm FEAL-8," ECL Review, vol. 36, no. 4, pp. 433-437, 1988.
-
A. Shiraishi, and A. Shimizu, "Fast Data Encipherment Algorithm FEAL-8,"
-
-
Miyaguchi, S.1
-
6
-
-
85027125988
-
-
NTT Review, vol. 2, no. 6, pp. 117-127, 1990.
-
S. Miyaguchi, S. Kurihara, K. Ohta, and H. Morita, "Expansion of FEAL cipher," NTT Review, vol. 2, no. 6, pp. 117-127, 1990.
-
S. Kurihara, K. Ohta, and H. Morita, "Expansion of FEAL Cipher,"
-
-
Miyaguchi, S.1
-
7
-
-
84947904428
-
-
Lecture Notes in Computer Science, FSE '97, pp. 54-68, 1997.
-
M. Matsui, "New block encryption algorithm MISTY," Lecture Notes in Computer Science, FSE '97, pp. 54-68, 1997.
-
"New Block Encryption Algorithm MISTY,"
-
-
Matsui, M.1
-
9
-
-
0028337944
-
-
IEICE Trans. Fundamentals, vol. E77-A, no. I, pp. 2-7, 1994.
-
M. Matsui and A. Yamagishi, "A new cryptanalytic method for FEAL cipher," IEICE Trans. Fundamentals, vol. E77-A, no. I, pp. 2-7, 1994.
-
"A New Cryptanalytic Method for FEAL Cipher,"
-
-
Matsui, M.1
Yamagishi, A.2
-
10
-
-
0019634370
-
-
Commun. ACM, vol. 24, no. l 1, pp. 770-772, 1981.
-
L. Lamport, "Password authentication with insecure communication," Commun. ACM, vol. 24, no. l 1, pp. 770-772, 1981.
-
"Password Authentication with Insecure Communication,"
-
-
Lamport, L.1
-
11
-
-
85027132068
-
-
Proc. of the Internet Society Symposium on Network and Distributed System Security, pp. 151-158, 1994.
-
N. Haller, 'The S/KEY(TM) one-time password system," Proc. of the Internet Society Symposium on Network and Distributed System Security, pp. 151-158, 1994.
-
'The S/KEY(TM) One-time Password System,"
-
-
Haller, N.1
-
12
-
-
85027109229
-
-
IEICE Trans. , vol. J73-D-I, no. 7, pp. 630-636, July 1990.
-
A. Shimizu, "A dynamic password authentication method by one-way function," IEICE Trans. , vol. J73-D-I, no. 7, pp. 630-636, July 1990.
-
"A Dynamic Password Authentication Method by One-way Function,"
-
-
Shimizu, A.1
-
13
-
-
0025840878
-
-
System and Computers in Japan, vol. 22, no. 7, 1991.
-
A. Shimizu, "A dynamic password authentication method by one-way function," System and Computers in Japan, vol. 22, no. 7, 1991.
-
"A Dynamic Password Authentication Method by One-way Function,"
-
-
Shimizu, A.1
-
16
-
-
85027182863
-
-
IEICE Technical Report, OFS97-39, 1997.
-
T. Horioka, M. Toda, and A. Shimizu, "E-mail messages forwarding services," IEICE Technical Report, OFS97-39, 1997.
-
M. Toda, and A. Shimizu, "E-mail Messages Forwarding Services,"
-
-
Horioka, T.1
|