-
2
-
-
84873466407
-
Authenticated and key exchange secure against dictionary attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated and key exchange secure against dictionary attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
24944584156
-
-
Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions in SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, 3494, pp. 36-57. Springer, Heidelberg (2005)
-
Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions in SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36-57. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems (TOCS) 8(1), 18-36 (1990)
-
(1990)
ACM Transactions on Computer Systems (TOCS)
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
0031637758
-
A simple logic for authentication protocol design
-
Rockport, Massachusetts, USA, June 9-11, pp
-
Buttyán, L., Staamann, S., Wilhelm, U.: A simple logic for authentication protocol design. In: Proc. of 11th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, pp. 153-162 (1998)
-
(1998)
Proc. of 11th IEEE Computer Security Foundations Workshop
, pp. 153-162
-
-
Buttyán, L.1
Staamann, S.2
Wilhelm, U.3
-
6
-
-
25844495474
-
An efficient nonce-based authentication with key agreement
-
Chen, Y.-C., Yeh, L.-Y.: An efficient nonce-based authentication with key agreement. Applied Mathematics and Computation 169(2), 982-994 (2005)
-
(2005)
Applied Mathematics and Computation
, vol.169
, Issue.2
, pp. 982-994
-
-
Chen, Y.-C.1
Yeh, L.-Y.2
-
7
-
-
12844274508
-
Note on robust and simple authentication protocol
-
Chien, H.-Y., Wang, R.-C., Yang, C.-C.: Note on robust and simple authentication protocol. The Computer Journal 48(1), 27-29 (2005)
-
(2005)
The Computer Journal
, vol.48
, Issue.1
, pp. 27-29
-
-
Chien, H.-Y.1
Wang, R.-C.2
Yang, C.-C.3
-
9
-
-
0002805220
-
Undetected on-line password guessing attacks
-
Ding, Y., Horster, P.: Undetected on-line password guessing attacks. ACM Operating Systems Review 29(4), 77-86 (1995)
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.4
, pp. 77-86
-
-
Ding, Y.1
Horster, P.2
-
10
-
-
38149047216
-
A high-speed DES implement for network applications
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Eberle, H.: A high-speed DES implement for network applications. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 527-545. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 527-545
-
-
Eberle, H.1
-
11
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. on Information Theory IT-31, 469-472 (1985)
-
(1985)
IEEE Trans. on Information Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
12
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
Fan, C.-I., Chan, Y.-C., Zhang, Z.-K.: Robust remote authentication scheme with smart cards. Computers & Security 24, 619-628 (2005)
-
(2005)
Computers & Security
, vol.24
, pp. 619-628
-
-
Fan, C.-I.1
Chan, Y.-C.2
Zhang, Z.-K.3
-
13
-
-
0030123246
-
Efficient blind signature schemes based on quadratic residues
-
Fan, C.-I., Lei, C.-L.: Efficient blind signature schemes based on quadratic residues. IEE Electronics Letters 32(9), 811-813 (1996)
-
(1996)
IEE Electronics Letters
, vol.32
, Issue.9
, pp. 811-813
-
-
Fan, C.-I.1
Lei, C.-L.2
-
15
-
-
1942455353
-
Efficient multi-server password authenticated key agreement using smart cards
-
Juang, W.-S.: Efficient multi-server password authenticated key agreement using smart cards. IEEE Trans. on Consumer Electronics 50(1), 251-255 (2004)
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.1
, pp. 251-255
-
-
Juang, W.-S.1
-
16
-
-
1542335451
-
Efficient password authenticated key agreement using smart cards
-
Juang, W.-S.: Efficient password authenticated key agreement using smart cards. Computers & Security 23, 167-173 (2004)
-
(2004)
Computers & Security
, vol.23
, pp. 167-173
-
-
Juang, W.-S.1
-
17
-
-
4043095653
-
Efficient three-party key exchange using smart cards
-
Juang, W.-S.: Efficient three-party key exchange using smart cards. IEEE Trans. on Consumer Electronics 50(2), 619-624 (2004)
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.2
, pp. 619-624
-
-
Juang, W.-S.1
-
18
-
-
33745904732
-
Efficient User Authentication and Key Agreement in Ubiquitous Computing
-
Gavrilova, M, Gervasi, O, Kumar, V, Tan, C.J.K, Taniar, D, Laganà, A, Mun, Y, Choo, H, eds, ICCSA 2006, Springer, Heidelberg
-
Juang, W.-S.: Efficient User Authentication and Key Agreement in Ubiquitous Computing. In: Gavrilova, M., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganà, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3983, pp. 396-405. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3983
, pp. 396-405
-
-
Juang, W.-S.1
-
19
-
-
24144494609
-
Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
-
Ku, W.-C., Chang, S.-T.: Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards. IEICE Trans. on communications E88-B(5), 2165-2167 (2005)
-
(2005)
IEICE Trans. on communications
, vol.E88-B
, Issue.5
, pp. 2165-2167
-
-
Ku, W.-C.1
Chang, S.-T.2
-
20
-
-
4344596953
-
Stolen-verifier attack on an efficient smart card-based one-time password authentication scheme
-
Ku, W.-C., Tsai, H.-C., Tsaur, M.-J.: Stolen-verifier attack on an efficient smart card-based one-time password authentication scheme. IEICE Trans. on communications E87-B(8), 2374-2376 (2004)
-
(2004)
IEICE Trans. on communications
, vol.E87-B
, Issue.8
, pp. 2374-2376
-
-
Ku, W.-C.1
Tsai, H.-C.2
Tsaur, M.-J.3
-
21
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Communications of the ACM 24, 770-772 (1981)
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
22
-
-
33646477537
-
An efficient and complete remote user authentication scheme using smart cards
-
Liaw, H.-T., Lin, J.-F., Wu, W.-C.: An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling 44, 223-228 (2006)
-
(2006)
Mathematical and Computer Modelling
, vol.44
, pp. 223-228
-
-
Liaw, H.-T.1
Lin, J.-F.2
Wu, W.-C.3
-
23
-
-
33845565699
-
Impersonation attack on two-gene-relation password authentication protocol 2GR
-
Lin, C.-L., Hung, C.-P.: Impersonation attack on two-gene-relation password authentication protocol 2GR. IEICE Trans. on communications E89-B(12), 3425-3427 (2006)
-
(2006)
IEICE Trans. on communications
, vol.E89-B
, Issue.12
, pp. 3425-3427
-
-
Lin, C.-L.1
Hung, C.-P.2
-
24
-
-
33748942118
-
A new strong-password authenticaton scheme using one-way hash functions
-
Lin, C.-W., Tsai, C.-S., Hwang, M.-S.: A new strong-password authenticaton scheme using one-way hash functions. International Journal of Computer and Systems Sciences 45(4), 623-626 (2006)
-
(2006)
International Journal of Computer and Systems Sciences
, vol.45
, Issue.4
, pp. 623-626
-
-
Lin, C.-W.1
Tsai, C.-S.2
Hwang, M.-S.3
-
25
-
-
84937461306
-
One-way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: One-way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
26
-
-
33144456748
-
Secure remote user access over insecure networks
-
Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Computers Communications 29, 660-667 (2006)
-
(2006)
Computers Communications
, vol.29
, pp. 660-667
-
-
Peyravian, M.1
Jeffries, C.2
-
27
-
-
0017930809
-
A method for obtaining digital signature and public key cryptosystems
-
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signature and public key cryptosystems. Communications of the ACM 21, 120-126 (1978)
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
28
-
-
32444434862
-
Efficient remote mutual authentication and key agreement
-
Shieh, W.-G., Wang, J.-M.: Efficient remote mutual authentication and key agreement. Computers & Security 25, 72-77 (2006)
-
(2006)
Computers & Security
, vol.25
, pp. 72-77
-
-
Shieh, W.-G.1
Wang, J.-M.2
-
29
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme
-
Ku, W.-C., Chen, C.-M., Lee, H.-L.: Cryptanalysis of a variant of Peyravian-Zunic's password authentication scheme. IEICE Trans. on Communications E86-B, 1682-1684 (2003)
-
(2003)
IEICE Trans. on Communications
, vol.E86-B
, pp. 1682-1684
-
-
Ku, W.-C.1
Chen, C.-M.2
Lee, H.-L.3
-
30
-
-
1942423677
-
Weakness and improvement of an efficient password based remote user authentication scheme using smart cards
-
Ku, W.-C., Chen, S.-M.: Weakness and improvement of an efficient password based remote user authentication scheme using smart cards. IEEE Trans. on Consumer Electronics 50(1), 204-207 (2004)
-
(2004)
IEEE Trans. on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.-C.1
Chen, S.-M.2
-
31
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart card security under the threat of power analysis attacks. IEEE Trans. on Computers 51(5), 541-552 (2002)
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|