Elliptic curves in cryptography
Elliptic curves in cryptography
Password authentication with insecure communication
Communications of the ACM
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
More Efficient and Secure Remote User Authentication Scheme using Smart Cards
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Workshops - Volume 02
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
Bilinear-pairing-based remote user authentication schemes using smart cards
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Hi-index | 0.00 |
In 2006, Manik et al. proposed a novel remote user authentication scheme using bilinear pairings. Chou et al. identified a weakness in this scheme and made improvements. In addition, Thulasi et al. noted that both Manik et al.'s and Chou et al.'s schemes are vulnerable to forgery and replay attacks. In this paper, we analyze the previous schemes based on a timestamp and provide further comments together with an improved scheme using a nonce.