Cryptology ePrint Archive: Report 2010/165

Available versions in chronological order


Comment on four two-party authentication protocols
Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3


[ Cryptology ePrint archive ]