A remote password authentication scheme based on the digital signature method
From MaRDI portal
Publication:4240622
Recommendations
Cites work
- scientific article; zbMATH DE number 5995471 (Why is no real title available?)
- scientific article; zbMATH DE number 3304495 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- A “Paradoxical” Solution to The Signature Problem
- New directions in cryptography
- Using encryption for authentication in large networks of computers
Cited in
(14)- A simple remote user authentication scheme
- A countable and time-bound password-based user authentication scheme for the applications of electronic commerce
- Security analysis of three password authentication schemes
- AN EFFICIENT PASSWORD AUTHENTICATION SCHEME BASED ON A UNIT CIRCLE
- A new key authentication scheme based on discrete logarithms
- A new remote user authentication scheme for multi-server architecture
- Information Security and Cryptology - ICISC 2005
- Analysis and extension of S/Key-based authentication schemes for digital home networks
- Cryptanalysis of a remote password authentication scheme
- scientific article; zbMATH DE number 1753916 (Why is no real title available?)
- A new strong-password authentication scheme using one-way hash functions
- Password authentication based on fractal coding scheme
- Cryptography and Coding
- A new method for using hash functions to solve remote user authentication
This page was built for publication: A remote password authentication scheme based on the digital signature method
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4240622)