Research Article

A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

Algorithm 2

.
(1) Extract all the secret information from the memory of the stolen or lost smart
 card of the user using the power analysis attacks [23, 24].
(2) Call oracle on input in order to retrieve and as .
(3) Call oracle on input to retrieve , and as .
(4) if ( ) and ( ) then
(5)  Accept as the correct password of the user .
(6)  return 1 (Success)
(7) else
(8)  return 0 (Failure)
(9) end if