In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Jiang et al., is a password-based authentication scheme. which does not use smart cards. We note that this scheme is an improvement over Chen et al.\u27s scheme shown vulnerable to the off-line dictionary attack by Jiang et al. We perform a cryptanalysis on Jiang at al.\u27s improved protocol and observe that it is prone to the clogging attack, a kind of denial of service (DoS) attack. We then suggest an improvement on the protocol to prevent the clogging attack. The other protocol we consider for analysis is by Wang et al. This is a smart card based authentication protocol. We again perform the clogging (DoS) attack on this protoc...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
[[abstract]]With the current level of development of network technologies, various business activiti...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This pro...
In this work we consider two elliptic curve cryptography based authentication protocols for performi...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
[[abstract]]With the current level of development of network technologies, various business activiti...
Abstract. In this work we consider two protocols for performing crypt-analysis and security enhancem...
In this work, we argue that the usage of computationally intensive mathematical operations in passwo...
Abstract—In this paper we study a scheme for making cryptanalysis and security improvement. This pro...
In this work we consider two elliptic curve cryptography based authentication protocols for performi...
[[abstract]]Remote authentication is an essential part of the rapid-growing electronic commerce. Rec...
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol, respectively. B...
Graduation date: 2007Authentication protocols play important roles in network security. A variety of...
ABSTRACT Password authentication with smart card is one of the simplest and efficient authenticatio...
password-based practical authentication scheme using one-way collision-resistant hash functions. How...
Abstract: Remote authentication is a method to authenticate remote users over insecure communication...
The design of secure and efficient smart-card-based password authentication schemes remains a challe...
Abstract. The design of secure and efficient smart-card-based password authentication schemes remain...
In 2003, Lin et al. proposed an enhanced protocol of optimal strong-password authentication protocol...
Abstract: In 2003, Wu and Chieu proposed a user friendly remote authentication scheme using smart ca...
[[abstract]]With the current level of development of network technologies, various business activiti...