Password authentication with insecure communication
Communications of the ACM
Research: Remote login authentication scheme based on a geometric approach
Computer Communications
A remote user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
A new key authentication scheme based on discrete logarithms
Applied Mathematics and Computation
Security enhancement for Optimal Strong-Password Authentication protocol
ACM SIGOPS Operating Systems Review
Security enhancement for optimal strong-password authentication protocol
ACM SIGOPS Operating Systems Review
Cryptanalysis of a user authentication scheme using hash functions
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Two-factor mutual authentication based on smart cards and passwords
Journal of Computer and System Sciences
Formal analysis and systematic construction of two-factor authentication scheme (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A simple remote user authentication scheme
Mathematical and Computer Modelling: An International Journal
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
Journal of Medical Systems
Hi-index | 0.24 |
In this article, we present a cryptanalysis of Wu's proposed efficient remote login authentication scheme which is based on simple geometric properties on the Euclidean plane. We show that the scheme contains pitfalls in the authentication phase.