References
- L. Lamport, "Password authentication with insecure communication," Communication of the ACM, 24(11), pp. 770-772, 1981. https://doi.org/10.1145/358790.358797
- C.C Chang, T.C. Wu, "Remote password authentication with smart cards," IEEE Proceedings-E, 138(3), pp. 165-168, 1991. https://doi.org/10.1049/ip-d.1991.0023
- H.Y. Chien, J.K. Jan, Y.M. Tseng, "An efficient and practical solution to remote authentication using smart card," Computers & Security, 21(4), pp. 372-375, 2002. https://doi.org/10.1016/S0167-4048(02)00415-7
- C.L. Hsu, "Security of two remote user authentication schemes using smart card," IEEE Transactions on Consumer Electronics, 49(4), pp. 1196-1198, 2003. https://doi.org/10.1109/TCE.2003.1261216
- J.Q. Kiu, J. Sun, T.H. Li, "An enhanced remote login authentication with smart card," Proceedings of IEEE Workshop on Signal Proceeding Systems Design and telecommunications, vol. 14, pp. 91-94, 2005.
- L.L. Hu, X.X. Niu, Y.X. Yang, "Weakness and improvements of a remote user authentication scheme using smart cards," The journal of China univ. of posts and telecommunications, vol. 14, pp. 91-94, 2007. https://doi.org/10.1016/S1005-8885(07)60155-1
- J. M. Seo, H. Y. An, "Security Improvements on the Remote User Authentication Scheme Using Smart Cards", Journal of the Korea Society of Computer and Information, Vol. 15, No.3, pp. 91-97, 2010. 3. https://doi.org/10.9708/jksci.2010.15.3.091
- J. Xu, W.T Zhu, D.G. Feng, "An improved smart card based password authentication scheme with provable security," Computers Standards & Interfaces, 31, pp. 723-728, 2009. https://doi.org/10.1016/j.csi.2008.09.006
- P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," Proceedings of Advances in Cryptology (CRYPTO 99), pp. 388-398, 1999.
- T.S, Messerges, E.A, Dabbish, R.H. Sloan, "Examining smart-cards security under the threat of power analysis attacks," IEEE Transactions on Computers, 51(5), pp. 541-552, 2002. https://doi.org/10.1109/TC.2002.1004593