Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function.
Jaewook JungDonghoon LeeJiye KimYoungsook LeeDongwoo KangDongho WonPublished in: IMCOM (2016)
Keyphrases
- hash functions
- user authentication
- authentication scheme
- authentication protocol
- secret key
- hashing algorithm
- security analysis
- provably secure
- similarity search
- smart card
- key agreement
- image encryption
- diffie hellman
- key management
- cost effective
- data distribution
- hash table
- block cipher
- mutual authentication
- information security
- encryption scheme
- data mining
- information systems