Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.
Guilin WangFeng BaoPublished in: ICICS (2006)
Keyphrases
- password authentication
- smart card
- secret key
- authentication protocol
- secure communication
- digital signature
- security requirements
- java card
- security analysis
- key exchange protocol
- information security
- security mechanisms
- key distribution
- signature scheme
- distributed databases
- hash functions
- diffie hellman
- power analysis
- information systems