• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Cryptanalysis of a Timestamp-Based Password Authentication Scheme”, (2004) available at: http://eprint.iacr.org/2004/040.pdf (0)

by L Yang, K Chen
Add To MetaCart

Tools

Sorted by:
Results 1 - 2 of 2

3.1 Basic Terms

by unknown authors
"... Ui – The ith user seeking for authentication by the server ..."
Abstract - Add to MetaCart
Ui – The ith user seeking for authentication by the server
(Show Context)

Citation Context

... •g PWi• d• ri•f(CIDi ,T) e ) mod n = IDi•g PWi• ri•f(CIDi ,T) mod n IDi•Xf f(CIDi , Tf ) mod n = IDi•g ri•PWi•w• f(CIDi ,Tf ) mod n = IDi•g PWi• ri•f(CIDi ,T) mod n 4.3 Impersonation Attack Based on =-=[8]-=- An attacker can impersonate a legitimate user Ui, with identity IDi, following the procedure: 1. Intercepts the login request message M = {IDi, CIDi, Xi, Yi, n, e, g, T}. 2. Computes, IDf = IDi -1 mo...

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards*

by Al-sakib Khan Pathan†a, Choong Seon Hong†b , 2006
"... The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authe ..."
Abstract - Add to MetaCart
The intent of this letter is to propose an efficient timestamp based password authentication scheme using smart cards. We show various types of forgery attacks against Shen et al.’s timestamp-based password authentication scheme and improve their scheme to ensure robust security for the remote authentication process, keeping all the advantages of their scheme. Our scheme successfully defends the attacks that could be launched against other related previous schemes. Key words:
(Show Context)

Citation Context

...[1] came up with one enhanced scheme based on [2]swhich they claimed to be efficient enough to protect thesauthentication process from forged login or forged serversattacks. Unfortunately, later [7], =-=[8]-=- and [9] showed thatsthe improved scheme proposed by Shen et al. was stillsvulnerable to the forgery attacks. Wang and Li [10]sproposed another improved scheme based on Yang-Shiehsscheme [2] assuming ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University