Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis
IEEE Transactions on Computers
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
Improving the security of 'a flexible biometrics remote user authentication scheme'
Computer Standards & Interfaces
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
Computer Standards & Interfaces
Cryptanalysis of a password authentication scheme over insecure networks
Journal of Computer and System Sciences
A remote user authentication scheme without using smart cards
Computer Standards & Interfaces
Provably secure and efficient identification and key agreement protocol with user anonymity
Journal of Computer and System Sciences
Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme
AINA '12 Proceedings of the 2012 IEEE 26th International Conference on Advanced Information Networking and Applications
A provably secure authenticated key agreement protocol for wireless communications
Computers and Electrical Engineering
Mobile device integration of a fingerprint biometric remote authentication scheme
International Journal of Communication Systems
A new remote user authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
An efficient remote use authentication scheme using smart cards
IEEE Transactions on Consumer Electronics
IEEE Transactions on Consumer Electronics
A pairing-free certificateless authenticated key agreement protocol
International Journal of Communication Systems
Hi-index | 0.00 |
In 2010, Chen et al. focused at the vulnerability of smart card based authentication systems owing to leakage of secret information from smart card. They proposed a scheme with a view to boost the security of such authentication systems. However, in 2012, Truong et al. found Chen et al.'s scheme weak at resisting replay attack and spoofing attacks; thereby they proposed an improved scheme to counterfeit these weaknesses. Undoubtedly, the improved scheme by Truong et al. is free from defects pointed out on Chen et al.'s scheme, but here we show that problems like impersonation attacks, password guessing, etc are adhered with its design. We show that Truong et al.'s scheme violates Chen et al.'s aim to get rid of information-leak hazard from the smart card or mobile device based authentication schemes.