Sciweavers

427 search results - page 49 / 86
» Cryptanalysis of the
Sort
View
IJNSEC
2008
143views more  IJNSEC 2008»
13 years 8 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 8 months ago
Cryptanalysis of Syverson's Rational Exchange Protocol
The notion of rational exchange introduced by Syverson in 1998 is a particularly interesting alternative when an efficient scheme for fair exchange is required but the existence o...
Almudena Alcaide, Juan M. Estévez-Tapiador,...
IAJIT
2006
76views more  IAJIT 2006»
13 years 8 months ago
Modified Cryptanalysis of RC5
Mowafak Hasan, Hasan Al-Shalabi
IJNSEC
2006
92views more  IJNSEC 2006»
13 years 8 months ago
Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards
Recently, Yang et al. improved Yang and Shieh's two password authentication schemes to withstand Sun and Yeh's forgery attacks. However, Kim et al. pointed out that Yang...
Ren-Chiun Wang, Chou Chen Yang
IJNSEC
2006
113views more  IJNSEC 2006»
13 years 8 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez