2015
DOI: 10.12988/ams.2015.56420
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Tso et al.'s password authentication scheme based on smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 5 publications
0
9
0
Order By: Relevance
“…Nevertheless, this paper points out that Baruah et al's scheme has the following security problems [3,4,5,6] unlike their claims: (1) The scheme is still vulnerable to identity guessing attack with stolen smart card [3]. 2The scheme is vulnerable to replay attack [4].…”
Section: Introductionmentioning
confidence: 85%
“…Nevertheless, this paper points out that Baruah et al's scheme has the following security problems [3,4,5,6] unlike their claims: (1) The scheme is still vulnerable to identity guessing attack with stolen smart card [3]. 2The scheme is vulnerable to replay attack [4].…”
Section: Introductionmentioning
confidence: 85%
“…However, this paper points out that Yeh's scheme has the following security and efficiency problems [5,6] unlike their claims: (1) The scheme is still vulnerable to off-line password guessing attack with stolen smart card [6]. 2The scheme has computational efficiency problem when the service provider authenticates the user sending message [5].…”
Section: Introductionmentioning
confidence: 95%
“…This section demonstrates that Yeh's lightweight authentication scheme with user untraceability [4] cannot withstand an off-line password guessing attack with stolen smart card [6] and has computational efficiency problem [5].…”
Section: Cryptanalysis Of Yeh's Authentication Schemementioning
confidence: 99%
See 2 more Smart Citations