-
1
-
-
33751197641
-
Comment on 'a dynamic ID-based remote user authentication scheme'
-
A.K. Awasthi, Comment on 'a dynamic ID-based remote user authentication scheme', Transaction on Cryptology, Vol.1, No.2, 2004, pp. 15-17.
-
(2004)
Transaction on Cryptology
, vol.1
, Issue.2
, pp. 15-17
-
-
Awasthi, A.K.1
-
2
-
-
35048818034
-
Correlation power analysis with a leakage model
-
E. Brier, C. Clavier, and F. Oliver, Correlation power analysis with a leakage model, Lecture Notes in Computer Science, Vol.3156, 2004, pp. 135-152.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 135-152
-
-
Brier, E.1
Clavier, C.2
Oliver, F.3
-
3
-
-
25844495474
-
An efficient nonce-based authentication scheme with key agreement
-
Y.C. Chen, and L.Y. Yeh, An efficient nonce-based authentication scheme with key agreement, Applied Mathematics and Computation, Vol.169, No.2, 2005, pp. 982-994.
-
(2005)
Applied Mathematics and Computation
, vol.169
, Issue.2
, pp. 982-994
-
-
Chen, Y.C.1
Yeh, L.Y.2
-
5
-
-
64249169230
-
Weaknesses and improvement of Wang et al.'sremote user password authentication scheme for resource-limited environments
-
H.R. Chung, W.C. Ku, and M.J. Tsaur, Weaknesses and improvement of Wang et al.'sremote user password authentication scheme for resource-limited environments, Computer Standards & Interface, Vol.31, No.4, 2009, pp. 863-868.
-
(2009)
Computer Standards & Interface
, vol.31
, Issue.4
, pp. 863-868
-
-
Chung, H.R.1
Ku, W.C.2
Tsaur, M.J.3
-
6
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
M.L. Das, A. Saxena, and V.P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, Vol.50, No.2, 2004, pp. 629-631.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
7
-
-
33744776672
-
A novel remote user authentication scheme using bilinear pairings
-
M.L. Das, A. Saxena, V. Gulati, and D. Phatak, A novel remote user authentication scheme using bilinear pairings, Computers & Security, Vol.25, No.3, 2006, pp. 184-189.
-
(2006)
Computers & Security
, vol.25
, Issue.3
, pp. 184-189
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.3
Phatak, D.4
-
10
-
-
28044451335
-
Robust remote authentication scheme with smart cards
-
C.I. Fan, Y.C, Chan, and Z.K. Zhang, Robust remote authentication scheme with smart cards, Computer & Security, Vol.24, No.8, 2005, pp. 619-628.
-
(2005)
Computer & Security
, vol.24
, Issue.8
, pp. 619-628
-
-
Fan, C.I.1
Chan, Y.C.2
Zhang, Z.K.3
-
11
-
-
38049017461
-
Improved differential power analysis attacks on AES hardware implementations
-
Y. Han, X. Zou, Z. Liu, and Y. Chen, Improved differential power analysis attacks on AES hardware implementations, International Conference on Wireless Communications, Networking and Mobile Computing, 2007, pp. 2230-2233.
-
(2007)
International Conference on Wireless Communications, Networking and Mobile Computing
, pp. 2230-2233
-
-
Han, Y.1
Zou, X.2
Liu, Z.3
Chen, Y.4
-
12
-
-
77951108942
-
Correlation power analysis of large word sizes
-
N. Hanley, R. McEvoy, M. Tunstall, C. Whelan, C. Murphy, and W.P. Marnane, Correlation power analysis of large word sizes, Irish Signals and Systems Conference, 2007.
-
(2007)
Irish Signals and Systems Conference
-
-
Hanley, N.1
McEvoy, R.2
Tunstall, M.3
Whelan, C.4
Murphy, C.5
Marnane, W.P.6
-
15
-
-
59649086399
-
Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards
-
H.C. Hsiang and W.K. Shih, Weaknesses and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards, Computer Communications, Vol.32, No.4, 2009, pp. 649-652.
-
(2009)
Computer Communications
, vol.32
, Issue.4
, pp. 649-652
-
-
Hsiang, H.C.1
Shih, W.K.2
-
16
-
-
62749100129
-
A secure remote mutual authentication and key agreement without smart cards
-
H.C. Hsiang and W.K. Shih, A secure remote mutual authentication and key agreement without smart cards, Information Technology Journal, Vol.8, No.3, 2009, pp. 333-339.
-
(2009)
Information Technology Journal
, vol.8
, Issue.3
, pp. 333-339
-
-
Hsiang, H.C.1
Shih, W.K.2
-
17
-
-
62749144567
-
Efficient remote mutual authentication and key agreement with perfect forward secrecy
-
H.C. Hsiang and W.K. Shih, Efficient remote mutual authentication and key agreement with perfect forward secrecy, Information Technology Journal, Vol.8, No.3, 2009, pp. 366-371.
-
(2009)
Information Technology Journal
, vol.8
, Issue.3
, pp. 366-371
-
-
Hsiang, H.C.1
Shih, W.K.2
-
19
-
-
0037008805
-
A simple remote user authentication scheme
-
M.S. Hwang, C.C. Lee, and Y.L. Tang, A simple remote user authentication scheme, Mathematical and Computer Modelling, Vol.36, No.1, 2002, pp. 103-107.
-
(2002)
Mathematical and Computer Modelling
, vol.36
, Issue.1
, pp. 103-107
-
-
Hwang, M.S.1
Lee, C.C.2
Tang, Y.L.3
-
20
-
-
27244453895
-
On second-order differential power analysis
-
M. Joye, P. Paillier, and B. Schoenmakers, On second-order differential power analysis, Lecture Notes in Computer Science, Vol.3659, 2005, pp. 293-308.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 293-308
-
-
Joye, M.1
Paillier, P.2
Schoenmakers, B.3
-
22
-
-
51349141735
-
Anonymous and traceable authentication scheme using smart cards
-
S. Kim, H.S. Rhee, J.Y. Chun, and D.H. Lee, Anonymous and traceable authentication scheme using smart cards, Second International Conference on Information Security and Assurance, 2008, pp. 162-165.
-
(2008)
Second International Conference on Information Security and Assurance
, pp. 162-165
-
-
Kim, S.1
Rhee, H.S.2
Chun, J.Y.3
Lee, D.H.4
-
23
-
-
61849096169
-
More secure remote user authentication scheme
-
S.K. Kim, M.G. Chung, More secure remote user authentication scheme, Computer Communications, Vol.32, No.6, 2009, pp. 1018-1021.
-
(2009)
Computer Communications
, vol.32
, Issue.6
, pp. 1018-1021
-
-
Kim, S.K.1
Chung, M.G.2
-
24
-
-
84939573910
-
Differential power analysis
-
P. Kocher, J. Jaffe, and B. Jun, Differential power analysis, Lecture Notes in Computer Science, Vol.1666, 1999, pp. 388-397.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
25
-
-
1942423677
-
Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
-
W.C. Ku and S.M. Chen, Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, Vol.50, No.1, 2004, pp. 204-207.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 204-207
-
-
Ku, W.C.1
Chen, S.M.2
-
26
-
-
24144494609
-
Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards
-
W.C. Ku and S.T. Chang, Impersonation attack on a dynamic ID-based remote user authentication scheme using smart cards, IEICE Transactions on Communications, Vol.E88-B, No.5, 2005, pp. 2165-2167.
-
(2005)
IEICE Transactions on Communications
, vol.E88-B
, Issue.5
, pp. 2165-2167
-
-
Ku, W.C.1
Chang, S.T.2
-
28
-
-
33748126252
-
A password authentication scheme over insecure networks
-
I.E. Liao, C.C. Lee, and M.S. Hwang, A password authentication scheme over insecure networks, Journal of Computer and System Sciences, Vol.72, No.4, 2006, pp. 727-740.
-
(2006)
Journal of Computer and System Sciences
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, I.E.1
Lee, C.C.2
Hwang, M.S.3
-
29
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
J.Y. Liu, A.M. Zhou, and M.X. Gao, A new mutual authentication scheme based on nonce and smart cards, Computer Communications, Vol.31, No.10, 2008, pp. 2205-2209.
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
30
-
-
27244451021
-
Successfully attacking masked AES hardware implementations
-
S. Mangard, N. Pramstaller, and E. Oswald, Successfully attacking masked AES hardware implementations, Lecture Notes in Computer Science, Vol.3659, 2005, pp. 157-171.
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 157-171
-
-
Mangard, S.1
Pramstaller, N.2
Oswald, E.3
-
31
-
-
0036566408
-
Examining smart card security and under the threat of power analysis attacks
-
T.S. Messerges, E.A. Dabbish, and R.H. Sloan, Examining smart card security and under the threat of power analysis attacks, IEEE Transactions on Computers, Vol.51, No.5, 2002, pp. 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
33
-
-
33746248709
-
A forward-secure user authentication scheme with smart cards
-
B. Wang and Z.Q. Li, A forward-secure user authentication scheme with smart cards, International Journal of Network Security, Vol.3, No.2, 2006, pp. 116-119.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.2
, pp. 116-119
-
-
Wang, B.1
Li, Z.Q.2
-
35
-
-
35248864423
-
Password-based access control scheme with remote user authentication using smart cards
-
C. Yang, W. Ma, B. Huang, and X. Wang, Password-based access control scheme with remote user authentication using smart cards, Advanced Information Networking and Applications Workshops, 2007, pp. 448-452.
-
(2007)
Advanced Information Networking and Applications Workshops
, pp. 448-452
-
-
Yang, C.1
Ma, W.2
Huang, B.3
Wang, X.4
-
36
-
-
4043152192
-
Further improvement of an efficient password based remote user authentication scheme using smart cards
-
E.J. Yoon, E.K. Ryu, and K.Y. Yoo, Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, Vol.50, No.2, 2004, pp. 612-614.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
37
-
-
38649100328
-
An anonymous digital cash and fair payment protocol utilizing smart card in mobile environments
-
L. Zhang, J.P. Yin, and Y.B. Zhan, An anonymous digital cash and fair payment protocol utilizing smart card in mobile environments, Fifth International Conference on Grid and Cooperative Computing Workshops, 2006, pp. 335-340.
-
(2006)
Fifth International Conference on Grid and Cooperative Computing Workshops
, pp. 335-340
-
-
Zhang, L.1
Yin, J.P.2
Zhan, Y.B.3
|