Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol.
Hung-Min SunBin-Tsan HsiehShin-Mu TsengPublished in: EEE (2004)
Keyphrases
- authentication protocol
- security analysis
- secret key
- public key
- hash functions
- smart card
- wireless networks
- wireless communication
- authentication scheme
- user authentication
- mobile devices
- signature scheme
- lightweight
- rfid tags
- security requirements
- encryption scheme
- security protocols
- key management
- mobile communication
- elliptic curve
- real time
- similarity search
- rfid systems
- secure communication
- diffie hellman
- password authentication