1. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
2. Hwang, T., Chen, Y., Laih, C.S.: Non-interactive password authentication without password tables. In: IEEE Region 10 Conference on Computer and Communication System, vol. 1, pp. 429–431, September 1990
3. Horng, G.: Password authentication without using password table. Comput. Secur. 24(8), 619–628 (1995)
4. Lin, I.C., Hwang, M.S., Li, L.H.: Improving the security of a flexible biometrics remote user authentication scheme. Future Gener. Comput. Syst. 19, 1322 (2002)
5. Lee, H., Won, D.: Prevention of exponential equivalence in simple password exponential key exchange (SPEKE). Symmetry 7(3), 1587–1594 (2015). doi:
10.3390/sym7031587