Design of improved password authentication and update scheme based on elliptic curve cryptography (Q2450508): Difference between revisions

From MaRDI portal
Created claim: Wikidata QID (P12): Q114663095, #quickstatements; #temporary_batch_1712201099914
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: A new modified remote user authentication scheme using smart cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient password authenticated Key agreement using bilinear pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of a password authentication scheme over insecure networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Examining smart-card security under the threat of power analysis attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4826108 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short signatures from the Weil pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4460706 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank

Latest revision as of 12:05, 8 July 2024

scientific article
Language Label Description Also known as
English
Design of improved password authentication and update scheme based on elliptic curve cryptography
scientific article

    Statements

    Design of improved password authentication and update scheme based on elliptic curve cryptography (English)
    0 references
    0 references
    0 references
    14 May 2014
    0 references
    password authentication
    0 references
    elliptic curve cryptography
    0 references
    cryptographic hash function
    0 references
    impersonation attack
    0 references
    insider attack
    0 references

    Identifiers