Results 1 - 10
of
113
How To Prove Yourself: Practical Solutions to Identification and Signature Problems
, 1987
"... In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys. The schemes are provably secure against any known or chosen message attack ff factoring is difficult ..."
Abstract
-
Cited by 1028 (1 self)
- Add to MetaCart
is difficult, and typical implementations require only 1% to 4% of the number of modular multiplications required by the RSA scheme. Due to their simplicity, security and speed, these schemes are ideally suited for microprocessor-based devices such as smart cards, personal computers, and remote control system.q.
Cryptanalysis of a Remote User Authentication scheme using Smart Cards
"... Abstract Seo et al. criticizes that Hu-Niu-Yang’s certification scheme is not enough to satisfy the security requirements of a smart card-based certification scheme because it has a weakness of password guessing attack as well as gives attackers opportunities to be disguised as legitimate users. How ..."
Abstract
- Add to MetaCart
Abstract Seo et al. criticizes that Hu-Niu-Yang’s certification scheme is not enough to satisfy the security requirements of a smart card-based certification scheme because it has a weakness of password guessing attack as well as gives attackers opportunities to be disguised as legitimate users
An Enhanced Remote User Authentication Scheme with Smart Card
"... In 2000, Hwang and Li’s proposed a new remote user authentication scheme with smart cards. Some researchers pointed out the security weaknesses of Hwang and Li’s scheme and they also proposed some modified schemes to avoid these weaknesses. In 2004, Kumar proposed a new remote user authentication sc ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
In 2000, Hwang and Li’s proposed a new remote user authentication scheme with smart cards. Some researchers pointed out the security weaknesses of Hwang and Li’s scheme and they also proposed some modified schemes to avoid these weaknesses. In 2004, Kumar proposed a new remote user authentication
Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards
"... Abstract: In 2010, Sood-Sarje-Singh proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is more secure than Das et al.’s scheme and Liao et al.’s scheme. However, we show that Sood et al.’s scheme is still vulnerable to malicious user attack, man-in-the-middle ..."
Abstract
- Add to MetaCart
Abstract: In 2010, Sood-Sarje-Singh proposed a dynamic ID-based remote user authentication scheme and claimed that their scheme is more secure than Das et al.’s scheme and Liao et al.’s scheme. However, we show that Sood et al.’s scheme is still vulnerable to malicious user attack, man
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards
"... Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes are ..."
Abstract
- Add to MetaCart
Abstract. Password authentication is an important mechanism for remote login systems, where only authorized users can be authenticated via using their passwords and/or some similar secrets. In 1999, Yang and Shieh [14] proposed two password authentication schemes using smart cards. Their schemes
1Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment
"... Abstract: Multi-server authentication is going to be an integral part of remote authentication with the passage of time. The remote authentication has been part and parcel of internet based communication. In the last decade several multi-server authentication techniques has been presented. However t ..."
Abstract
- Add to MetaCart
there is still a need of more efficient and robust techniques. Lately, Saraswathi et al., presented a multi-server authentication scheme that has been found under much vulnerability like stolen card attack, misrepresentation attack, and forward secrecy attacks. This paper presents the cryptanalysis
Password authentication schemes with smart cards
- Computers and Security
, 1999
"... In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up, auth ..."
Abstract
-
Cited by 54 (0 self)
- Add to MetaCart
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their pass-words freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. Once the secure network environment is set up
Cryptanalysis and Improvement of Jiang et al.’s Smart Card Based Remote User Authentication Scheme
"... Smart card based remote user password authentication schemes are one of the user-friendly and scalable mechanism to establish secure communication between remote entities. These schemes try to ensure secure and authorized communication between remote entities over the insecure public network. Althou ..."
Abstract
- Add to MetaCart
Smart card based remote user password authentication schemes are one of the user-friendly and scalable mechanism to establish secure communication between remote entities. These schemes try to ensure secure and authorized communication between remote entities over the insecure public network
Remote password authentication with smart cards
- IEE Proc. computers and Digital Techniques
, 1999
"... Abstract: A remote password authentication scheme based on the Chinese remainder theorem is proposed. The scheme can verify the remote password without verification tables. In the initial phase, the password generation centre generates and assigns a password corresponding to each user. The ideas of ..."
Abstract
-
Cited by 47 (2 self)
- Add to MetaCart
of smart cards and the identity-based signature scheme introduced by Shamir are employed in this phase. Each user possesses a smart card for later login and authentication. In the login phase, the user submits the identity and password associated with the smart card. In the authentication phase, the system
Cryptanalysis and Improvement of a Dynamic ID Based Remote User Authentication Scheme Using Smart Cards ⋆
"... Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang’s scheme. However, we find that Lee-Lai-Li’s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers from ..."
Abstract
- Add to MetaCart
Recently, Lee, Lai and Li proposed a dynamic identity based remote user authentication scheme using smart card to remedy the weaknesses of Lee-Lin-Chang’s scheme. However, we find that Lee-Lai-Li’s scheme is still insecure and vulnerable to offline dictionary attack. Besides, the scheme suffers
Results 1 - 10
of
113