A Brief Consideration on the Security of Hash-Based Authenticator |
Byun, Jin Wook (Pyeongtaek University, Department of Information and Communication) |
1 | M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Proceedings of Eurocrypt'00, LNCS 1807, pp. 139-155, 2000. |
2 | Jia-Lun Tsai, Nai-Wei Lo, and Txong-Chen Wu, "Novel Anonymous Authentication Scheme Using Smart Cards," IEEE Transaction on Industrial Informatics vol. 9 Issue 4, pp. 2004-2013, Nov. 2013. DOI |