Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,925,683 papers from all fields of science
Search
Sign In
Create Free Account
Cryptographic nonce
Known as:
Nonce
, Nonce (cryptography)
In cryptography, a nonce is an arbitrary number that may only be used once. It is similar in spirit to a nonce word, hence the name. It is often a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Authentication protocol
Block cipher mode of operation
CBC-MAC
Challenge–response authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Lyman's Law is active in loanwords and nonce words: Evidence from naturalness judgment studies
S. Kawahara
2012
Corpus ID: 55194148
Highly Cited
2011
Highly Cited
2011
Design and Validation of an Efficient Authentication Scheme with Anonymity for Roaming Service in Global Mobility Networks
Daojing He
,
Sammy Chan
,
Chun Chen
,
Jiajun Bu
,
Rong Fan
Wireless personal communications
2011
Corpus ID: 28476191
Designing a user authentication protocol with anonymity for the global mobility network (GLOMONET) is a difficult task because…
Expand
Review
2007
Review
2007
Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards
Junghyun Nam
,
Seungjoo Kim
,
Sangjoon Park
,
Dongho Won
IEICE Transactions on Fundamentals of Electronics…
2007
Corpus ID: 32308686
A remote user authentication scheme is a two-party protocol whereby an authentication server in a distributed system confirms the…
Expand
2006
2006
An Efficient Selective Encryption of Fingerprint Images for Embedded Processors
Daesung Moon
,
Yongwha Chung
,
S. Pan
,
Kiyoung Moon
,
K. Chung
2006
Corpus ID: 60679745
Biometric‐based authentication can provide a strong security guarantee of the identity of users. However, the security of…
Expand
Highly Cited
2006
Highly Cited
2006
An efficient and complete remote user authentication scheme using smart cards
H. Liaw
,
Jiann-Fu Lin
,
Wei-Chen Wu
Mathematical and computer modelling
2006
Corpus ID: 32935158
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
2005
2005
Efficient nonce-based remote user authentication scheme using smart cards
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Applied Mathematics and Computation
2005
Corpus ID: 36626425
Review
2005
Review
2005
Security services and enhancements in the IEEE 802.15.4 wireless sensor networks
Yang Xiao
,
Sakshi Sethi
,
Hsiao-Hwa Chen
,
Bo Sun
GLOBECOM '05. IEEE Global Telecommunications…
2005
Corpus ID: 11023375
The IEEE 802.15.4 specification defines medium access control (MAC) layer and physical layer for wireless sensor networks…
Expand
Highly Cited
2004
Highly Cited
2004
Efficient password authenticated key agreement using smart cards
Wen-Shenq Juang
Computers & security
2004
Corpus ID: 11579889
Highly Cited
2003
Highly Cited
2003
ID-based password authentication scheme using smart cards and fingerprints
Hyun-Sung Kim
,
Sung-Woon Lee
,
K. Yoo
OPSR
2003
Corpus ID: 14270977
This paper proposes two ID-based password authentication schemes, which does not require a dictionary of passwords or…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE