Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards.
Chin-Chen ChangKuo-Feng HwangPublished in: Informatica (2003)
Keyphrases
- remote user authentication scheme
- smart card
- password guessing
- security analysis
- java card
- information security
- digital images
- security mechanisms
- security requirements
- secret key
- differential power analysis
- digital signature
- user authentication
- authentication scheme
- secure communication
- power analysis
- authentication protocol
- sys tems
- sensitive data
- countermeasures
- peer to peer