메뉴 건너뛰기




Volumn 4307 LNCS, Issue , 2006, Pages 399-409

Cryptanalysis of timestamp-based password authentication schemes using smart cards

Author keywords

Attack; Hash function; Password authentication; Smart card

Indexed keywords

HASH FUNCTIONS; SMART CARDS;

EID: 85007377325     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935308_28     Document Type: Conference Paper
Times cited : (2)

References (17)
  • 3
    • 0036167785 scopus 로고    scopus 로고
    • Cryptanalysis of timestamp-based password authentication scheme
    • C.K. Chan and L.M. Cheng, “Cryptanalysis of timestamp-based password authentication scheme,” Computers & Security, vol. 21, no. 1, pp. 74-76, 2002.
    • (2002) Computers & Security , vol.21 , Issue.1 , pp. 74-76
    • Chan, C.K.1    Cheng, L.M.2
  • 4
    • 0036429021 scopus 로고    scopus 로고
    • An enhancement of timestamp-based password authentication scheme
    • L. Fan, J. H. Li, and H. W. Zhu, “An enhancement of timestamp-based password authentication scheme,” Computers & Security, vol. 21, no. 7, pp. 665-667, 2002.
    • (2002) Computers & Security , vol.21 , Issue.7 , pp. 665-667
    • Fan, L.1    Li, J.H.2    Zhu, H.W.3
  • 5
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme smart cards
    • M.S. Hwang and L.H. Li, “A new remote user authentication scheme smart cards,” IEEE Transactions on Consumer Electronics, vol. 46, pp. 28-30, 2000.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 6
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, pp. 770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 7
    • 85025632599 scopus 로고    scopus 로고
    • Public key cryptography standards, PKCS #1 v2.1
    • PKCS, “Public key cryptography standards, PKCS #1 v2.1,” RSA Cryptography Standard, Draft 2, 2001. http://www.rsasecurity.com/rsalabs/pkcs/
    • (2001) RSA Cryptography Standard, Draft , pp. 2
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir, and L.M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, No. 2, pp. 120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 Feb , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 9
    • 0242552286 scopus 로고    scopus 로고
    • Security enhancement for the timestamp-based password authentication scheme using smart cards
    • J.J. Shen, C.W. Lin, and M.S. Hwang, “Security enhancement for the timestamp-based password authentication scheme using smart cards,” Computers & Security, vol. 22, no. 7, pp. 591-595, 2003.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 591-595
    • Shen, J.J.1    Lin, C.W.2    Hwang, M.S.3
  • 10
    • 0003950652 scopus 로고
    • Introduction to Analytic and Probabilistic Number Theory (Theorem 5, page 41)
    • Cambridge University Press
    • G. Tenenbaum. Introduction to Analytic and Probabilistic Number Theory (Theorem 5, page 41). Cambridge studies in advanced mathematics, Vol. 46. Cambridge University Press, 1995.
    • (1995) Cambridge Studies in Advanced Mathematics , vol.46
    • Tenenbaum, G.1
  • 11
    • 85025624651 scopus 로고    scopus 로고
    • http://mathworld.wolfram.com/RelativelyPrime.html
  • 12
    • 0242552288 scopus 로고    scopus 로고
    • Cryptanalysis of an enhanced timestamp-based password authentication scheme
    • B. Wang, J.-H. Li, and Z.-P. Tong, “Cryptanalysis of an enhanced timestamp-based password authentication scheme,” Computers & Security, vol. 22, no. 7, pp. 643-645, 2003.
    • (2003) Computers & Security , vol.22 , Issue.7 , pp. 643-645
    • Wang, B.1    Li, J.-H.2    Tong, Z.-P.3
  • 14
    • 0033350090 scopus 로고    scopus 로고
    • Password authentication schemes with smart cards
    • W.H. Yang and S.P. Shieh, “Password authentication schemes with smart cards,” Computers & Security, vol. 18, no. 8, pp. 727-733, 1999.
    • (1999) Computers & Security , vol.18 , Issue.8 , pp. 727-733
    • Yang, W.H.1    Shieh, S.P.2
  • 15
    • 4043177806 scopus 로고    scopus 로고
    • Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards
    • C.-C. Yang, H.-W. Yang, and R.-C. Wang, “Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, No. 2, pp. 578-579, May 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 May , Issue.2 , pp. 578-579
    • Yang, C.-C.1    Yang, H.-W.2    Wang, R.-C.3
  • 16
    • 12244291938 scopus 로고    scopus 로고
    • An improvement of the Yang-Shieh password authentication schemes
    • C.C. Yang, R.C. Wang, and T.Y. Chang, “An improvement of the Yang-Shieh password authentication schemes,” Applied Mathematics and Computation, vol. 162, No. 3, pp. 1391-1396, 2005.
    • (2005) Applied Mathematics and Computation , vol.162 , Issue.3 , pp. 1391-1396
    • Yang, C.C.1    Wang, R.C.2    Chang, T.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.