期刊文献+

对密码算法各种攻击方法初探

在线阅读 下载PDF
导出
摘要 信息安全是当前重要的问题之一,本文主要介绍了密码攻击的基本知识和针对密码算法的攻击方法。
作者 郑再雄
出处 《消费导刊》 2008年第2期156-156,共1页
  • 相关文献

参考文献5

二级参考文献51

  • 1Lamport L. Password suthentication with insecure communication[J]. Communications of the ACM, 1981, 24(11):770~772.
  • 2Hwang M S, Li L H. A new remote authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000,46(1):28~30.
  • 3Chan C K, Cheng L M. Cryptanalysis of a remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000,46(4):992~993.
  • 4Shen J J, Lin C W, Hwang M S. A modified remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2003, 49(2):414~416.
  • 5Leung K C, Cheng L M, Anthony S Fong, et al. Cryptanalysis of a modified remote user authentication scheme using smart cards [J]. IEEE Transactions on Consumer Electronics, 2003, 39(14):1243~1245.
  • 6Amit K, Awasthi, Sunder L. A remote user authentication scheme using smart cards with forward secrecy[J]. IEEE Transactions on Consumer Electronics, 2003, 49(4):1246~1248.
  • 7Sun H M. An efficient remote use authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(4):958~961.
  • 8Chien H Y, Jan J K, Tsing Y M. An efficient and practical solution to remote authentication:smart cards[J]. Computers and Security, 2002, 21( 4):372~375.
  • 9Hsu C L. Security of two remote user authentication schemes using smart cards[J]. IEEE Transactions on Consumer Electronics, 2003, 49(4):1196~1198.
  • 10Ku W C, Chen S M. Weaknesses and improvements of an efficient password base remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2004,50(1):204~206.

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部