Login / Signup
Cryptanalysis of an efficient password authentication scheme.
Chiu-Shu Pan
Cheng-Yi Tsai
Shyh-Chang Tsaur
Min-Shiang Hwang
Published in:
ICSAI (2016)
Keyphrases
</>
authentication scheme
user authentication
secret key
smart card
information security
image encryption
public key
password guessing
image authentication
authentication protocol
security analysis
hash functions
cost effective
key management
mutual authentication
security flaws