Password based remote authentication scheme using ECC for smart card
Citations
78 citations
70 citations
Cites methods from "Password based remote authenticatio..."
...Author of [22] provided a password based remote authentication scheme for SC based on ECDH....
[...]
46 citations
14 citations
References
206 citations
176 citations
"Password based remote authenticatio..." refers background or methods in this paper
...Fan Chan Zhang [24] proposed a robust remote authentication scheme with smart card....
[...]
...Fan Chan Zhang [24] proposed a robust remote authentication scheme with smart card....
[...]
...The major contribution of Fan Chan Zhang [24] scheme is a method for preventing the offline dictionary attack even if the secret information stored in a smart card is compromised....
[...]
...The major contribution of Fan Chan Zhang [24] scheme is a method for preventing the offline dictionary attack even if the secret information stored in a smart card is compromised....
[...]
175 citations
"Password based remote authenticatio..." refers background in this paper
...Yoon Ryu Yoo[22] citing Awasthi Lal [14] proposed a hash based authentication scheme based on the work of Chien et.al[11]....
[...]
...Yoon Ryu Yoo [21], presents an enhancement to resolve the problems in above-mentioned scheme....
[...]
...Yoon Ryu Yoo [21], presents an enhancement to resolve the problems in above-mentioned scheme....
[...]
...[30] show that Yoon et al scheme [21] is subject to forgery attacks if the information stored in the smart card is stolen....
[...]
173 citations
Additional excerpts
...[35] 4 1 h S Encry T T 3 1 h S Encry T T 1 4 1 EC M h S Encry T T T ...
[...]
168 citations
"Password based remote authenticatio..." refers background or methods in this paper
...Later, Shen [14] analyzed impersonation attack of Chan [9] on Hwang Li s [8] scheme, and suggested methods to repulse the attack....
[...]
...Tsai, Lee and Hwang [27] present the survey of all currently available password–authentication–related schemes and get them classified in terms of several crucial criteria....
[...]
...The proposed scheme removes the pitfalls in the already mentioned schemes [27]....
[...]
...[14] J. J. Shen, C. W. Lin and M. S. Hwang (2003), A modified Remote User Authentication Scheme using Smart Card, IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, pp. 414-416, 2003....
[...]
...The major drawbacks of their scheme are the higher computation and communication costs, because of using Rabin’ s public-key cryptosystem [27]....
[...]