Authentication schemes with no verification table

@article{Chang2005AuthenticationSW,
  title={Authentication schemes with no verification table},
  author={Ya-Fen Chang and Chin-Chen Chang},
  journal={Applied Mathematics and Computation},
  year={2005},
  volume={167},
  pages={820-832}
}
In 2000, Hwang and Yeh presented an improved version of Peyravian and Zunic s scheme by using the server s public key. In 2003, Lin and Hwang indicated that Hwang and Yeh s scheme suffers from the denial-of-service attack and proposed a password authentication scheme with secure password updating. However, the verification table needed in both Hwang and Yeh s and Lin and Hwang s schemes makes these schemes vulnerable to the stolen-verifier attack. To overcome their drawback, we propose two… CONTINUE READING
5 Citations
11 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 11 references

Improvement on Peyravian–Zunic s password authentication schemes

  • J. J. Hwang, T. C. Yeh
  • IEICE Transactions on Communications E85-B (4)
  • 2002
1 Excerpt

Applied Cryptography

  • P. Sutherland
  • Protocols, Algorithms, and Source Code in C…
  • 1996
1 Excerpt

T

  • B. C. Neuman
  • Ts o , Kerberos: An authentication service for…
  • 1994
1 Excerpt

Similar Papers

Loading similar papers…