Shared Authentication Token Secure Against Replay and Weak Key Attacks.
Sung-Ming YenKuo-Hong LiaoPublished in: Inf. Process. Lett. (1997)
Keyphrases
- security mechanisms
- secure communication
- private key
- block cipher
- security protocols
- access control
- authentication protocol
- authentication scheme
- cryptographic protocols
- security requirements
- identity management
- security issues
- security analysis
- user authentication
- data encryption
- authentication mechanism
- public key
- resource constrained
- factor authentication
- stream cipher
- smart card
- secure routing
- security services
- integrity verification
- cryptographic algorithms
- key distribution
- password authentication
- chosen plaintext
- protection schemes
- digital signature
- public key infrastructure
- high security
- advanced encryption standard
- secure manner
- security measures
- diffie hellman
- image authentication
- key management
- watermarking scheme