AbstractIn public key cryptosystem, the protecting of public keys against intruders is very important. Usually, key authentication schemes are required to preserve public keys. Most of the key authentication schemes require one or more authorities to authenticate public keys. Some other key authentication schemes require no authorities to authenticate public keys. The Zuhua Shao proposed a new scheme to overcome the drawbacks of existing schemes, but it has some vulnerabilities. This scheme relies only on key server for certificate generation. In a distributed network, the server can easily impersonate other legitimate users and listen the messages directed to them. Moreover, in this scheme, users’ passwords are stored in the form of plaint...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption ...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
AbstractIn public key cryptosystem, the protecting of public keys against intruders is very importan...
AbstractPassword authentication is one of the most common and elementary applications of encryption ...
Abstract. Key authentication is very important in secret communica-tions and data security. Recently...
One of the main goals of a cryptographic system is to provide authentication, which simply means pro...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
[[abstract]]In 2000, Hwang and Yeh presented an improved version of Peyravian and Zunic?s scheme by ...
Recently, Wang-Wang have discussed a two birds with one stone: two-factor authentication with securi...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
Within our plan, a session secret is only accessible towards the interacting parties (user and serve...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
The paper proposes a new scheme of authenticated encryption that is either publicly verifiable or no...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption ...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
AbstractIn public key cryptosystem, the protecting of public keys against intruders is very importan...
AbstractPassword authentication is one of the most common and elementary applications of encryption ...
Abstract. Key authentication is very important in secret communica-tions and data security. Recently...
One of the main goals of a cryptographic system is to provide authentication, which simply means pro...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
AbstractThe security of a password authentication scheme using smart cards proposed by Liao et al. [...
[[abstract]]In 2000, Hwang and Yeh presented an improved version of Peyravian and Zunic?s scheme by ...
Recently, Wang-Wang have discussed a two birds with one stone: two-factor authentication with securi...
In this paper, we analyzed Hsu-Chuang scheme and presented the vulnerability. We further secured the...
Within our plan, a session secret is only accessible towards the interacting parties (user and serve...
Even though user anonymity is an important issue in many e-commerce applications, most of smartcard-...
The paper proposes a new scheme of authenticated encryption that is either publicly verifiable or no...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...
Signcryption is a cryptographic primitive that performs digital signature and public key encryption ...
International audiencePassword-Authenticated Key Exchange allows users to generate a strong cryptogr...