Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards.
Wei-Chi KuShen-Tien ChangPublished in: IEICE Trans. Commun. (2005)
Keyphrases
- smart card
- remote user authentication scheme
- secret key
- authentication protocol
- password guessing
- security analysis
- information security
- digital signature
- power analysis
- java card
- authentication scheme
- secure communication
- differential power analysis
- security mechanisms
- key distribution
- security requirements
- diffie hellman
- sensitive data
- encryption scheme
- key agreement