Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme (original) (raw)

A simple attack on a recently introduced hash-based strong-password authentication scheme

kim minho

International Journal of Network Security, 2005

View PDFchevron_right

An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards

Hao-Chuan Tsai

Multimedia and Ubiquitous Engineering, 2007

View PDFchevron_right

An Improved Hou-Wang's User Authentication Scheme

Cheng-ying Yang

2018

View PDFchevron_right

An Efficient Authentication Scheme

Sattar Aboud

International Journal for Infonomics, 2011

View PDFchevron_right

Improvements on two password-based authentication protocols

周志賢 資訊管理學系-

2009

View PDFchevron_right

The Weakness of Moon et al.’s Password Authentication Scheme

Bang Irawan

Journal of Physics: Conference Series, 2018

View PDFchevron_right

Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol

Seungjoo Kim

Journal of Information Science and Engineering, 2010

View PDFchevron_right

A secure YS-like user authentication scheme

Gwoboa Horng

Informatica, 2007

View PDFchevron_right

Cryptoanalysis on Zhou et al.s' User Authentication Scheme

周志賢 資訊管理學系-

2006

View PDFchevron_right

Provably secure password-authenticated key exchange using Diffie-Hellman

sindulakshmi l.narayanan

Advances in Cryptology—Eurocrypt …, 2000

View PDFchevron_right

On the Security of Methods for Protecting Password Transmission

Hung Yu Chien

Informatica (lithuanian Academy of Sciences), 2001

View PDFchevron_right

A Password-Based Authenticator: Security Proof and Applications

Juan Manuel

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol

Marko Hölbl, Tatjana Welzer

Computer Communications, 2008

View PDFchevron_right

Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme

Cheng-ying Yang

IOP Conference Series: Materials Science and Engineering

View PDFchevron_right

Cryptanalysis of An Advanced Authentication Scheme

Sattar Aboud

International Journal of Advanced Computer Science and Applications, 2011

View PDFchevron_right

A Study on the Security of Authentication Systems

Otuekong Umoren

2021

View PDFchevron_right

The Weaknesses of the Virtual Password Authentication Protocol with Cookie

Cheng-ying Yang

IOP Conference Series: Materials Science and Engineering

View PDFchevron_right

Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks

Yung-Cheng Lee

Advanced Materials Research, 2011

View PDFchevron_right

Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions

Olivier Blazy

Topics in Cryptology - CT-RSA 2016, 2016

View PDFchevron_right

On the Security of Some Password-Based Key Agreement Schemes

Chris Mitchell

Lecture Notes in Computer Science, 2005

View PDFchevron_right

A General Approach of Authentication Scheme and its Comparative Study

Dr. Sanjeev K U M A R Mandal

View PDFchevron_right

Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme

IOSR Journals

View PDFchevron_right

Intensifying the Authentication Schemes ToFortify the Network Security: A Survey

Wesley Porpatham

2014

View PDFchevron_right

Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh

Pablo Velarde Alvarado

Journal of Applied Research and Technology, 2013

View PDFchevron_right

Systematic Design of a Family of Attack-Resistant Authentication Protocols

Rai Amir

IEEE Journal on Selected Areas in Communications, 1993

View PDFchevron_right

Comment on four two-party authentication protocols

周志賢 資訊管理學系-

eprint.iacr.org

View PDFchevron_right

AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD

Dr. Sanjeev K U M A R Mandal

View PDFchevron_right

The Weaknesses of the Virtual Password Authentication Protocol with Cookie The Weaknesses of the Virtual Password Authentication Protocol with Cookie

Osric Penea

View PDFchevron_right

An Improved Key Agreement Authentication Scheme Based on an Anonymous Password

Cheng-ying Yang

International Journal of Electrical and Electronic Engineering & Telecommunications

View PDFchevron_right

Attacks and Countermeasures for Secure User Authentication Mechanisms

Parwinder Dhillon

2021

View PDFchevron_right

A Practical and Secure Hash Function-Based Password Authentication Scheme

Muhammad Husain Ali

Journal of Computer Science, 2019

View PDFchevron_right