Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Chien-Lung Hsu,et al. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks , 2004, Comput. Secur..
[3] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[4] Chun-Li Lin,et al. A password authentication scheme with secure password updating , 2003, Comput. Secur..
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Robert H. Deng,et al. New efficient user identification and key distribution scheme providing enhanced security , 2004, Comput. Secur..
[7] Min-Shiang Hwang,et al. Security Enhancement for Protecting Password Transmission , 2003 .