<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.irtf-cfrg-augpake" target="https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-augpake-00">
   <front>
      <title>Augmented Password-Authenticated Key Exchange (AugPAKE)</title>
      <author initials="S." surname="Shin" fullname="SeongHan Shin">
         </author>
      <author initials="K." surname="Kobara" fullname="Kazukuni Kobara">
         </author>
      <date month="September" day="6" year="2013" />
      <abstract>
	 <t>   This document describes a secure and highly-efficient augmented
   password-authenticated key exchange (AugPAKE) protocol where a user
   remembers a low-entropy password and its verifier is registered in
   the intended server.  In general, the user password is chosen from a
   small set of dictionary whose space is within the off-line dictionary
   attacks.  The AugPAKE protocol described here is secure against
   passive attacks, active attacks and off-line dictionary attacks (on
   the obtained messages with passive/active attacks).  Also, this
   protocol provides resistance to server compromise in the context that
   an attacker, who obtained the password verifier from the server, must
   at least perform off-line dictionary attacks to gain any advantage in
   impersonating the user.  The AugPAKE protocol is not only provably
   secure in the random oracle model but also the most efficient over
   the previous augmented PAKE protocols (SRP and AMP).

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-augpake-00" />
   
</reference>
