Author:
Pursharthi Komal,Mishra Dheerendra
Publisher
Springer Science and Business Media LLC
Reference33 articles.
1. Kumari, S., Khan, M. K., & Li, X. (2014). An improved remote user authentication scheme with key agreement. Computers & Electrical Engineering, 40(6), 1997–2012.
2. Li, X., Niu, J.-W., Ma, J., Wang, W.-D., & Liu, C.-L. (2011). Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications, 34(1), 73–79.
3. Islam, S. H., & Basu, S. (2021). Pb-3paka: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments. Journal of Information Security and Applications, 63, 103026.
4. Dabra, V., Bala, A., & Kumari, S. (2020). LBA-PAKE: Lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Systems Journal, 15(4), 5067–5077.
5. Shor, P. W. (1994) Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th annual symposium on foundations of computer science (pp. 124–134). IEEE.