Ultralightweight Cryptography - Some Thoughts on Ten Years of Efforts
暂无分享,去创建一个
[1] Julio Hernandez-Castro,et al. Pitfalls in Ultralightweight Authentication Protocol Designs , 2016, IEEE Transactions on Mobile Computing.
[2] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[3] Hung-Min Sun,et al. On the Security of Chien's Ultralightweight RFID Authentication Protocol , 2011, IEEE Transactions on Dependable and Secure Computing.
[4] Yannick Seurin,et al. Good Variants of HB+ Are Hard to Find , 2008, Financial Cryptography.
[5] Gildas Avoine,et al. Strong Authentication and Strong Integrity (SASI) Is Not That Strong , 2010, RFIDSec.
[6] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[7] Serge Vaudenay,et al. On Privacy Models for RFID , 2007, ASIACRYPT.
[8] Serge Vaudenay,et al. Smashing SQUASH-0 , 2009, EUROCRYPT.
[9] Frederik Armknecht,et al. Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts , 2014, RFIDSec.
[10] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[11] Yannick Seurin,et al. HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.
[12] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[13] Juan E. Tapiador,et al. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations , 2008, ArXiv.
[14] Alfredo De Santis,et al. On Ultralightweight RFID Authentication Protocols , 2011, IEEE Transactions on Dependable and Secure Computing.
[15] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[16] Adi Shamir. SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags , 2008, FSE.
[17] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, Journal of Cryptology.
[18] Serge Vaudenay,et al. On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.
[19] Raphael C.-W. Phan,et al. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI , 2009, IEEE Transactions on Dependable and Secure Computing.
[20] David Cash,et al. Efficient Authentication from Hard Learning Problems , 2011, Journal of Cryptology.
[21] Alfredo De Santis,et al. Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol , 2008, AFRICACRYPT.
[22] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.