Comments on the S/KEY user authentication scheme
ACM SIGOPS Operating Systems Review
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Optimal Tree-Based One-Time Digital Signature Schemes
STACS '96 Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Directed Acyclic Graphs, One-way Functions and Digital Signatures
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On the Efficiency of One-Time Digital Signatures
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
How to construct optimal one-time signatures
Computer Networks: The International Journal of Computer and Telecommunications Networking
One time passwords in everything (OPIE): experiences with building and using stronger authentication
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Network security: private communication in a public world, second edition
Network security: private communication in a public world, second edition
Secure time information in the internet key exchange protocol
Annales UMCS, Informatica - Security Systems
Hi-index | 0.00 |
A provably secure protocol for remote authentication is presented. Only public information is stored at the verifying host that makes our scheme resistant to server compromise. We use one time signatures coupled with offline transcripts for synchronization. Due to sole usage of fast cryptographic hash functions, our method is appropriate for low cost user authentication. Our construction improves over the previously proposed technique of Mitchell to overcome its problem of Denial of Service (DoS) attacks.