Jinn-Ke Jan

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
A scheme of user authentication had been proposed to authenticate users based on the secret data stored inside a smart card and the property of an n-dimensional circle. We investigate the security of the scheme and show that the scheme is insecure under the dictionary attack, the impersonation attack, and the attack of impersonating the central authority.(More)
  • 1