Login / Signup
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
Ryo Nojima
Kazukuni Kobara
Hideki Imai
Published in:
INDOCRYPT (2006)
Keyphrases
</>
authentication scheme
secret key
pseudorandom
smart card
image authentication
user authentication
random number
data streams
high dimensional
cost effective
key management
authentication protocol
private key
security flaws