Sciweavers

INFORMATICALT
2007
109views more  INFORMATICALT 2007»
13 years 10 months ago
A Secure YS-Like User Authentication Scheme
Abstract. Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choos...
Tzungher Chen, Gwoboa Horng, Ke-Chiang Wu
IJNSEC
2006
85views more  IJNSEC 2006»
13 years 11 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
14 years 3 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...
ACISP
2007
Springer
14 years 5 months ago
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to ident...
Yongdong Wu, Feng Bao, Robert H. Deng