-
2
-
-
0034226114
-
0.292
-
0.292,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1339-1349, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.4
, pp. 1339-1349
-
-
Boneh, D.1
Durfee, G.2
-
3
-
-
0036167785
-
Cryptanalysis of timestamp-based password authentication scheme
-
C.K. Chan and L.M. Cheng, “Cryptanalysis of timestamp-based password authentication scheme,” Computers & Security, vol. 21, no. 1, pp. 74-76, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.1
, pp. 74-76
-
-
Chan, C.K.1
Cheng, L.M.2
-
4
-
-
0036429021
-
An enhancement of timestamp-based password authentication scheme
-
L. Fan, J. H. Li, and H. W. Zhu, “An enhancement of timestamp-based password authentication scheme,” Computers & Security, vol. 21, no. 7, pp. 665-667, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.7
, pp. 665-667
-
-
Fan, L.1
Li, J.H.2
Zhu, H.W.3
-
6
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, pp. 770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
7
-
-
85025632599
-
Public key cryptography standards, PKCS #1 v2.1
-
PKCS, “Public key cryptography standards, PKCS #1 v2.1,” RSA Cryptography Standard, Draft 2, 2001. http://www.rsasecurity.com/rsalabs/pkcs/
-
(2001)
RSA Cryptography Standard, Draft
, pp. 2
-
-
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, No. 2, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21 Feb
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
9
-
-
0242552286
-
Security enhancement for the timestamp-based password authentication scheme using smart cards
-
J.J. Shen, C.W. Lin, and M.S. Hwang, “Security enhancement for the timestamp-based password authentication scheme using smart cards,” Computers & Security, vol. 22, no. 7, pp. 591-595, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 591-595
-
-
Shen, J.J.1
Lin, C.W.2
Hwang, M.S.3
-
10
-
-
0003950652
-
Introduction to Analytic and Probabilistic Number Theory (Theorem 5, page 41)
-
Cambridge University Press
-
G. Tenenbaum. Introduction to Analytic and Probabilistic Number Theory (Theorem 5, page 41). Cambridge studies in advanced mathematics, Vol. 46. Cambridge University Press, 1995.
-
(1995)
Cambridge Studies in Advanced Mathematics
, vol.46
-
-
Tenenbaum, G.1
-
11
-
-
85025624651
-
-
http://mathworld.wolfram.com/RelativelyPrime.html
-
-
-
-
12
-
-
0242552288
-
Cryptanalysis of an enhanced timestamp-based password authentication scheme
-
B. Wang, J.-H. Li, and Z.-P. Tong, “Cryptanalysis of an enhanced timestamp-based password authentication scheme,” Computers & Security, vol. 22, no. 7, pp. 643-645, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 643-645
-
-
Wang, B.1
Li, J.-H.2
Tong, Z.-P.3
-
14
-
-
0033350090
-
Password authentication schemes with smart cards
-
W.H. Yang and S.P. Shieh, “Password authentication schemes with smart cards,” Computers & Security, vol. 18, no. 8, pp. 727-733, 1999.
-
(1999)
Computers & Security
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.H.1
Shieh, S.P.2
-
15
-
-
4043177806
-
Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards
-
C.-C. Yang, H.-W. Yang, and R.-C. Wang, “Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards,” IEEE Transactions on Consumer Electronics, vol. 50, No. 2, pp. 578-579, May 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50 May
, Issue.2
, pp. 578-579
-
-
Yang, C.-C.1
Yang, H.-W.2
Wang, R.-C.3
-
16
-
-
12244291938
-
An improvement of the Yang-Shieh password authentication schemes
-
C.C. Yang, R.C. Wang, and T.Y. Chang, “An improvement of the Yang-Shieh password authentication schemes,” Applied Mathematics and Computation, vol. 162, No. 3, pp. 1391-1396, 2005.
-
(2005)
Applied Mathematics and Computation
, vol.162
, Issue.3
, pp. 1391-1396
-
-
Yang, C.C.1
Wang, R.C.2
Chang, T.Y.3
-
17
-
-
26844467695
-
Security enhancement for password authentication schemes with smart cards
-
Springer-Verlag
-
E.-J. Yoon, W.-H. Kim, and K.-Y. Yoo, “Security enhancement for password authentication schemes with smart cards,” Proc. of Trust and Privacy in Digital Business (TrustBus’05), LNCS 3592, pp. 311-320. Springer-Verlag, 2005.
-
(2005)
Proc. of Trust and Privacy in Digital Business (TrustBus’05), LNCS
, vol.3592
, pp. 311-320
-
-
Yoon, E.-J.1
Kim, W.-H.2
Yoo, K.-Y.3
|