References [ 1] Amin, R., Maitra, T., Giri , D., & Srivastava, P. D. (2017). Cryptanalysis and improvement of an rsa based remote user authentication scheme using smart card. Wireless Personal Communications, 96(3), 4629-4659. [2] AMIN, Ruhul , et al. Cryptanalysis and improvement of an rsa based remote user authentication scheme using smart card. Wireless Personal Communications, 2017, 96.3: 4629-4659. Gupta BB, Quamara M. A taxonomy of various attacks on smart card–based applications and countermeasures. Concurrency Computat Pract Exper . 2018;e4993. https:// doi.org /10.1002/cpe.4993 Kaur, J., Kumar, A., & Bansal, M. (2017, September). Lightweight cipher algorithms for smart cards security: A survey and open challenges. In 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) (pp. 541-546). IEEE Savari , M., & Montazerolzohour , M. (2012, June). All about encryption in smart card. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic ( CyberSec ) (pp. 54-59). IEEE. https://en.wikipedia.org/wiki/Smart_card https://www.gemalto.com/companyinfo/smart-cards-basics 50