-
1
-
-
84944878354
-
-
CRC Press
-
Menezes, A. J., Oorschot, P. C., and Vanstone, S. A., Handbook of applied cryptography. CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
-
2
-
-
0344197994
-
Some forgery attack on a remote user authentication scheme using smart card
-
Chang, C. C., and Hwang, K. F., Some forgery attack on a remote user authentication scheme using smart card. Informatica 14(3):289-294, 2003.
-
(2003)
Informatica
, vol.14
, Issue.3
, pp. 289-294
-
-
Chang, C.C.1
Hwang, K.F.2
-
3
-
-
0034317895
-
Cryptanalysis of a remote user authentication scheme using smart cards
-
Chan C. K., and Cheng, L. M., Cryptanalysis of a remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron, 46(4):992-993, 2000.
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.4
, pp. 992-993
-
-
Chan, C.K.1
Cheng, L.M.2
-
4
-
-
9644303109
-
One-way hash function construction based on chaotic map with changeable parameter
-
Deng, S., Xiao, D., Liao, X., One-way hash function construction based on chaotic map with changeable parameter. Chaos, Solitons Fractals, 24:65-71, 2005.
-
(2005)
Chaos, Solitons Fractals
, vol.24
, pp. 65-71
-
-
Deng, S.1
Xiao, D.2
Liao, X.3
-
5
-
-
0034318245
-
An efficient remote user authentication scheme using smart cards
-
Sun, H. M., An efficient remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron, 46(4):958-961, 2000.
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.4
, pp. 958-961
-
-
Sun, H.M.1
-
6
-
-
0842267293
-
Security of a remote user authentication scheme using smart cards
-
Yeh, H. T., Sun, H. M., and Hsieh, B. T., Security of a remote user authentication scheme using smart cards. IEICE Trans. Commun., B(1)(E87):192-194, 2004.
-
(2004)
IEICE Trans. Commun., B
, vol.1
, Issue.E87
, pp. 192-194
-
-
Yeh, H.T.1
Sun, H.M.2
Hsieh, B.T.3
-
7
-
-
0025877538
-
Non-interactive password authentications without password tables
-
Hwang, T., Chen, Y., and Laih, C.-S., Non-interactive password authentications without password tables. In: Computer and Communication Systems, 1990. IEEE TENCON'90., 1990 IEEE Region 10 Conference on, Vol. 1, pages 429-431 1990.
-
(1990)
Computer and Communication Systems 1990. IEEE TENCON'90., 1990 IEEE Region 10 Conference on
, vol.1
, pp. 429-431
-
-
Hwang, T.1
Chen, Y.2
Laih, C.-S.3
-
8
-
-
67649344437
-
Cryptographic pseudo random sequence from spatial chaotic map
-
Liu S., and Sun, L., Cryptographic pseudo random sequence from spatial chaotic map. Chaos Solitions Fractals 41:2216-2229, 2009.
-
(2009)
Chaos Solitions Fractals
, vol.41
, pp. 2216-2229
-
-
Liu, S.1
Sun, L.2
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., Password authentication with insecure communication. Commun. ACM, 24:770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
10
-
-
0034204951
-
Simple and secure password authentication protocol(sas)
-
Sandirigama,M., Shimizu, A., and Noda,M. T., Simple and secure password authentication protocol(sas). IEICE Trans. Commun., B(6)(E83):1363-1365, 2000.
-
(2000)
IEICE Trans. Commun. B
, vol.6
, Issue.E83
, pp. 1363-1365
-
-
Sandirigama, M.1
Shimizu, A.2
Noda, M.T.3
-
11
-
-
0034140374
-
A new remote user authentication scheme using smart card
-
Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart card. IEEE Trans. Consum. Electron., 46(1):28-30, 2000.
-
(2000)
IEEE Trans. Consum. Electron.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
13
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
Elgamal, T., A public key cryptosystem and a signature scheme based on discrete logarithm. EEE Trans. Inf. Theory, 31(4):469-472, 1985.
-
(1985)
EEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
14
-
-
36349014859
-
A new method for using hash function to solve remote user authentication
-
Chen T. H., and Lee, W. B., A new method for using hash function to solve remote user authentication. Comput. Electr. Eng., 34(1):53-62, 2008.
-
(2008)
Comput. Electr. Eng.
, vol.34
, Issue.1
, pp. 53-62
-
-
Chen, T.H.1
Lee, W.B.2
-
15
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput., 51(5):541-552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|