-
1
-
-
1542647564
-
A remote user authentication scheme using smart cards with forward secrecy
-
Awasthi, A.K., and S. Lal (2003). A remote user authentication scheme using smart cards with forward secrecy. IEEE Trans. on Consumer Electron., 49(4), 1246-1248.
-
(2003)
IEEE Trans. on Consumer Electron
, vol.49
, Issue.4
, pp. 1246-1248
-
-
Awasthi, A.K.1
Lal, S.2
-
3
-
-
33750742005
-
-
White Paper, STMicroelectronics. Available
-
Bertoni, G.M., L. Chen, P. Fragneto, K.A. Harrison and G. Pelosi (2005). Computing tate pairing on smartcards. White Paper, STMicroelectronics. Available: http://www.st.com/stonline/products/families/smartcard/ches2005_v4. pdf
-
(2005)
Computing tate pairing on smartcards
-
-
Bertoni, G.M.1
Chen, L.2
Fragneto, P.3
Harrison, K.A.4
Pelosi, G.5
-
4
-
-
84874324906
-
Identity-based Encryption from the Weil pairing
-
Advances in Cryptology-CRYPTO 2001
-
Boneh, D., and M. Franklin (2001). Identity-based Encryption from the Weil pairing. In Advances in Cryptology-CRYPTO 2001, LNCS, vol. 2139. pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
Boneh, D., and M. Franklin (2003). Identity based encryption from the Weil pairing. SIAM J. of Computing, 32(3), 586-615.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
PKC 2003
-
Cha, J.C., and J.H. Cheon (2003). An identity-based signature from gap Diffie-Hellman groups. In PKC 2003, LNCS, vol. 2567. pp. 18-30.
-
(2003)
LNCS
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
8
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Chien, H.Y., J.K. Jan and Y.M. Tseng (2002). An efficient and practical solution to remote authentication: smart card. Computers and Security, 21(4), 372-375.
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
10
-
-
33744776672
-
A novel remote user authentication scheme using bilinear pairings
-
Das, M.L., A. Saxena, V.P. Gulati and D.B. Phatak (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184-189.
-
(2006)
Computers and Security
, vol.25
, Issue.3
, pp. 184-189
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
11
-
-
47949101954
-
An improved remote user authentication scheme with smart cards using bilinear pairings
-
Available
-
Giri, D., and P.D. Srivastava (2006). An improved remote user authentication scheme with smart cards using bilinear pairings. In Cryptology ePrint Archive. Available: http://eprint.iacr.org/2006/274.pdf
-
(2006)
Cryptology ePrint Archive
-
-
Giri, D.1
Srivastava, P.D.2
-
12
-
-
47949122508
-
Cryptanalysis of recently proposed Remote User Authentication Schemes
-
Available
-
Goriparthi, T., M.L. Das, A. Negi and A. Saxena (2006). Cryptanalysis of recently proposed Remote User Authentication Schemes. In Cryptology ePrint Archive. Available: http://eprint.iacr.org/2006/028.pdf
-
(2006)
Cryptology ePrint Archive
-
-
Goriparthi, T.1
Das, M.L.2
Negi, A.3
Saxena, A.4
-
14
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Gura, N., A. Patel, A. Wander, H. Eberle and S.C. Shantz (2004). Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of Cryptographic Hardware and Embedded Systems. pp. 119-132.
-
(2004)
Proceedings of Cryptographic Hardware and Embedded Systems
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
15
-
-
84994257463
-
Implementation of ECC/ECDSA cryptography algorithms based on Java card
-
Han, J.H., Y.J. Kim, S.I. Jun, K.I. Chung and C.H. Seo (2002). Implementation of ECC/ECDSA cryptography algorithms based on Java card. In Proceedings of 22nd International Conference on Distributed Computing Systems Workshops. pp. 272-276.
-
(2002)
Proceedings of 22nd International Conference on Distributed Computing Systems Workshops
, pp. 272-276
-
-
Han, J.H.1
Kim, Y.J.2
Jun, S.I.3
Chung, K.I.4
Seo, C.H.5
-
16
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M.S., and L.H. Li (2000). A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron., 46(1), 28-30.
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
17
-
-
0002063278
-
Paramita wisdom: Password authentication scheme without verification tables
-
Jan, J.K., and Y.Y. Chen (1998). Paramita wisdom: password authentication scheme without verification tables. Journal of Systems and Software, 42, 45-47.
-
(1998)
Journal of Systems and Software
, vol.42
, pp. 45-47
-
-
Jan, J.K.1
Chen, Y.Y.2
-
18
-
-
24144494609
-
-
Ku, W.C., and S.T. Chang (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88-B 5(5), 2165-2167.
-
Ku, W.C., and S.T. Chang (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88-B 5(5), 2165-2167.
-
-
-
-
19
-
-
33845214903
-
Cryptanalysis of a flexible remote user authentication scheme using smart cards
-
Ku, W.C., and S.M. Chen (2005). Cryptanalysis of a flexible remote user authentication scheme using smart cards. ACM Operating Systems Review, 39(1), 90-96.
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 90-96
-
-
Ku, W.C.1
Chen, S.M.2
-
20
-
-
33646469746
-
Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme
-
Ku, W.C., M.H. Chiang and S.T. Chang (2005). Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. ACM Operating Systems Review, 39(1), 85-89.
-
(2005)
ACM Operating Systems Review
, vol.39
, Issue.1
, pp. 85-89
-
-
Ku, W.C.1
Chiang, M.H.2
Chang, S.T.3
-
21
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L. (1981). Password authentication with insecure communication. Commun. of ACM, 24, 770-772.
-
(1981)
Commun. of ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
22
-
-
33646477537
-
An efficient and complete remote user authentication scheme using smart cards
-
Liaw, H.T., J.F. Lin and W.C. Wu (2006). An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 44, 223-228.
-
(2006)
Mathematical and Computer Modelling
, vol.44
, pp. 223-228
-
-
Liaw, H.T.1
Lin, J.F.2
Wu, W.C.3
-
23
-
-
24144458508
-
A new two-party identity-based authenticated key agreement
-
Proceedings of CT-RSA 2005
-
McCullagh, N., and P.S.L.M. Barreto (2005). A new two-party identity-based authenticated key agreement. In Proceedings of CT-RSA 2005, LNCS, vol. 3376. pp. 262-274.
-
(2005)
LNCS
, vol.3376
, pp. 262-274
-
-
McCullagh, N.1
Barreto, P.S.L.M.2
-
24
-
-
85041782014
-
-
NIST/NSA FIPS 180-2 (2005). Secure Hash Standard (SHS). NIST/NSA, Gaithersburg, MD, USA.
-
NIST/NSA FIPS 180-2 (2005). Secure Hash Standard (SHS). NIST/NSA, Gaithersburg, MD, USA.
-
-
-
-
25
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
Paterson, K. (2002). ID-based signatures from pairings on elliptic curves. Electronics Letters, 38(18), 1025-1026.
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.1
-
26
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
Pointcheval, D., and J. Stern (2000). Security arguments for digital signatures and blind signatures. Journal of Cryptography, 13, 361-396.
-
(2000)
Journal of Cryptography
, vol.13
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
28
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology, Crypto '84
-
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptology - Crypto '84, LNCS, vol. 196. pp. 47-53.
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
29
-
-
24144479376
-
Computing the tate pairing
-
Springer-Verlag. pp
-
Scott, M. (2005). Computing the tate pairing. In CT-RSA, LNCS, vol. 3376. Springer-Verlag. pp. 293-304.
-
(2005)
CT-RSA, LNCS
, vol.3376
, pp. 293-304
-
-
Scott, M.1
-
30
-
-
34548112540
-
Implementing cryptographic pairings on smartcards
-
Available
-
Scott, M., N. Costigan and W. Abdulwahab (2006). Implementing cryptographic pairings on smartcards. In Cryptology ePrint Archive. Available: http://eprint.iacr.org/2006/144.pdf
-
(2006)
Cryptology ePrint Archive
-
-
Scott, M.1
Costigan, N.2
Abdulwahab, W.3
-
31
-
-
33751395122
-
GPRS/UMTS-aided authentication protocol for wireless LANs
-
Tseng, Y.M. (2006). GPRS/UMTS-aided authentication protocol for wireless LANs. IEE Proceedings - Communications, 153(6), 810-817.
-
(2006)
IEE Proceedings - Communications
, vol.153
, Issue.6
, pp. 810-817
-
-
Tseng, Y.M.1
-
32
-
-
34249876364
-
A resource-constrained group key agreement protocol for imbalanced wireless networks
-
Tseng, Y.M. (2007). A resource-constrained group key agreement protocol for imbalanced wireless networks. Computers & Security, 26(4), 331-337.
-
(2007)
Computers & Security
, vol.26
, Issue.4
, pp. 331-337
-
-
Tseng, Y.M.1
|