{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:10:34Z","timestamp":1742911834361,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_28","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"399-409","source":"Crossref","is-referenced-by-count":2,"title":["Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards"],"prefix":"10.1007","author":[{"given":"Guilin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/168588.168596","volume-title":"Proc. of the 1st ACM Conference on Computer and Communications Security (CCS 1993)","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. of the 1st ACM Conference on Computer and Communications Security (CCS 1993), pp. 62\u201373. ACM press, New York (1993)"},{"issue":"4","key":"28_CR2","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/18.850673","volume":"46","author":"D. Boneh","year":"2000","unstructured":"Boneh, D., Durfee, G.: Cryptanalysis of RSA with private key d less than N\n                           0.292. IEEE Transactions on Information Theory\u00a046(4), 1339\u20131349 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/S0167-4048(02)00110-4","volume":"21","author":"C.K. Chan","year":"2002","unstructured":"Chan, C.K., Cheng, L.M.: Cryptanalysis of timestamp-based password authentication scheme. Computers & Security\u00a021(1), 74\u201376 (2002)","journal-title":"Computers & Security"},{"issue":"7","key":"28_CR4","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1016\/S0167-4048(02)01118-5","volume":"21","author":"L. Fan","year":"2002","unstructured":"Fan, L., Li, J.H., Zhu, H.W.: An enhancement of timestamp-based password authentication scheme. Computers & Security\u00a021(7), 665\u2013667 (2002)","journal-title":"Computers & Security"},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/30.826377","volume":"46","author":"M.S. Hwang","year":"2000","unstructured":"Hwang, M.S., Li, L.H.: A new remote user authentication scheme smart cards. IEEE Transactions on Consumer Electronics\u00a046, 28\u201330 (2000)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"28_CR6","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Communications of the ACM\u00a024, 770\u2013772 (1981)","journal-title":"Communications of the ACM"},{"key":"28_CR7","unstructured":"PKCS, Public key cryptography standards, PKCS #1 v2.1, RSA Cryptography Standard, Draft 2 (2001), \n                    \n                      http:\/\/www.rsasecurity.com\/rsalabs\/pkcs\/"},{"issue":"2","key":"28_CR8","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"issue":"7","key":"28_CR9","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/S0167-4048(03)00709-0","volume":"22","author":"J.J. Shen","year":"2003","unstructured":"Shen, J.J., Lin, C.W., Hwang, M.S.: Security enhancement for the timestamp-based password authentication scheme using smart cards. Computers & Security\u00a022(7), 591\u2013595 (2003)","journal-title":"Computers & Security"},{"key":"28_CR10","series-title":"Cambridge studies in advanced mathematics","first-page":"41","volume-title":"Introduction to Analytic and Probabilistic Number Theory (Theorem 5)","author":"G. Tenenbaum","year":"1995","unstructured":"Tenenbaum, G.: Introduction to Analytic and Probabilistic Number Theory (Theorem 5). Cambridge studies in advanced mathematics, vol.\u00a046, p. 41. Cambridge University Press, Cambridge (1995)"},{"key":"28_CR11","unstructured":"http:\/\/mathworld.wolfram.com\/RelativelyPrime.html"},{"issue":"7","key":"28_CR12","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/S0167-4048(03)00713-2","volume":"22","author":"B. Wang","year":"2003","unstructured":"Wang, B., Li, J.-H., Tong, Z.-P.: Cryptanalysis of an enhanced timestamp-based password authentication scheme. Computers & Security\u00a022(7), 643\u2013645 (2003)","journal-title":"Computers & Security"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-540-24691-6_3","volume-title":"Information Security and Cryptology - ICISC 2003","author":"G. Wang","year":"2004","unstructured":"Wang, G.: On the security of a group signature scheme with forward security. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 27\u201339. Springer, Heidelberg (2004)"},{"issue":"8","key":"28_CR14","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W.H. Yang","year":"1999","unstructured":"Yang, W.H., Shieh, S.P.: Password authentication schemes with smart cards. Computers & Security\u00a018(8), 727\u2013733 (1999)","journal-title":"Computers & Security"},{"issue":"2","key":"28_CR15","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/TCE.2004.1309428","volume":"50","author":"C.-C. Yang","year":"2004","unstructured":"Yang, C.-C., Yang, H.-W., Wang, R.-C.: Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards. IEEE Transactions on Consumer Electronics\u00a050(2), 578\u2013579 (2004)","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"3","key":"28_CR16","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1016\/j.amc.2004.03.017","volume":"162","author":"C.C. Yang","year":"2005","unstructured":"Yang, C.C., Wang, R.C., Chang, T.Y.: An improvement of the Yang-Shieh password authentication schemes. Applied Mathematics and Computation\u00a0162(3), 1391\u20131396 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"28_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/11537878_31","volume-title":"Trust, Privacy, and Security in Digital Business","author":"E.-J. Yoon","year":"2005","unstructured":"Yoon, E.-J., Kim, W.-H., Yoo, K.-Y.: Security enhancement for password authentication schemes with smart cards. In: Katsikas, S.K., L\u00f3pez, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol.\u00a03592, pp. 311\u2013320. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:09:41Z","timestamp":1566763781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11935308_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}