11
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Security enhancement of key authentication schemes based on discrete logarithms

&
Pages 351-358 | Received 01 Apr 2006, Published online: 03 Jun 2013

References

  • Lee , C. C. , Hwang , M. S. and Li , L. H. 2003 . A new key authentication scheme based on discrete logarithms . Applied Mathematics and Computation , 139 : 343 – 349 .
  • Peinado , A. 2004 . Cryptanalysis of LHL-key authentication scheme . Applied Mathematics and Computation , 152 : 721 – 724 .
  • Diffie , W. and Hellman , M. E. 1976 . New directions in cryptography . IEEE Transactions on Information Theory , 22 : 644 – 654 .
  • Horng , G. and Yang , G. S. 1996 . Key authentication scheme for cryptosystems based on logarithms . Computer Communications , 19 : 848 – 850 .
  • Zhan , B. , Li , Z. , Yang , Y. and Hu , Z. 1999 . On the security of HY-key authentication scheme . Computer Communications , 22 : 739 – 741 .
  • Li , G. , Lomas , M. A. , Needham , R. M. and Saltzer , J. H. 1993 . Protecting poorly chosen secrets from guessing attacks . IEEE Journal on Selected Areas in Communications , 11 : 648 – 656 .
  • ElGamal , T. 1985 . A public-key cryptosystem and a signature scheme based on discrete logarithms . IEEE Transactions on Information Theory , 33 ( 2 ) : 469 – 472 .
  • Rosen , K. H. 1999 . Elementary Number Theory and its Application , 4th , Addison Wesley Longman .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.