Login / Signup
Cryptanalysis of the shifted conjugacy authentication protocol.
Jonathan Longrigg
Alexander Ushakov
Published in:
J. Math. Cryptol. (2008)
Keyphrases
</>
authentication protocol
secret key
hash functions
smart card
public key
security analysis
lightweight
security protocols
password authentication
key management
rfid systems
rfid tags
trusted third party
signature scheme
data sets
encryption scheme
mutual authentication
response time