Weaknesses and Improvements of Yang-Chang-Hwang's Password Authentication Scheme (original) (raw)
Related papers
A simple attack on a recently introduced hash-based strong-password authentication scheme
International Journal of Network Security, 2005
An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards
Multimedia and Ubiquitous Engineering, 2007
An Improved Hou-Wang's User Authentication Scheme
2018
An Efficient Authentication Scheme
International Journal for Infonomics, 2011
Improvements on two password-based authentication protocols
2009
The Weakness of Moon et al.’s Password Authentication Scheme
Journal of Physics: Conference Series, 2018
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol
Journal of Information Science and Engineering, 2010
A secure YS-like user authentication scheme
Informatica, 2007
Cryptoanalysis on Zhou et al.s' User Authentication Scheme
2006
Provably secure password-authenticated key exchange using Diffie-Hellman
Advances in CryptologyEurocrypt …, 2000
On the Security of Methods for Protecting Password Transmission
Informatica (lithuanian Academy of Sciences), 2001
A Password-Based Authenticator: Security Proof and Applications
Lecture Notes in Computer Science, 2003
Improvement of the Peyravian-Jeffries's user authentication protocol and password change protocol
Computer Communications, 2008
Cryptanalysis of Security Analysis and Enhancements of a Remote User Authentication Scheme
IOP Conference Series: Materials Science and Engineering
Cryptanalysis of An Advanced Authentication Scheme
International Journal of Advanced Computer Science and Applications, 2011
A Study on the Security of Authentication Systems
2021
The Weaknesses of the Virtual Password Authentication Protocol with Cookie
IOP Conference Series: Materials Science and Engineering
Attack and Improvement of the Secure Password Authentication Protocol in Wireless Networks
Advanced Materials Research, 2011
Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Topics in Cryptology - CT-RSA 2016, 2016
On the Security of Some Password-Based Key Agreement Schemes
Lecture Notes in Computer Science, 2005
A General Approach of Authentication Scheme and its Comparative Study
Cryptanalysis and Security Enhancement of a Khan et al.'s Scheme
Intensifying the Authentication Schemes ToFortify the Network Security: A Survey
2014
Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh
Journal of Applied Research and Technology, 2013
Systematic Design of a Family of Attack-Resistant Authentication Protocols
IEEE Journal on Selected Areas in Communications, 1993
Comment on four two-party authentication protocols
eprint.iacr.org
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
An Improved Key Agreement Authentication Scheme Based on an Anonymous Password
International Journal of Electrical and Electronic Engineering & Telecommunications
Attacks and Countermeasures for Secure User Authentication Mechanisms
2021
A Practical and Secure Hash Function-Based Password Authentication Scheme
Journal of Computer Science, 2019