A Novel Probabilistic Passive Attack on the Protocols HB and HB+
暂无分享,去创建一个
[1] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[2] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[3] Hideki Imai,et al. A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication , 2006, IACR Cryptol. ePrint Arch..
[4] Stephen A. Weis. New foundations for efficient authentication, commutative cryptography, and private disjointness testing , 2006 .
[5] Tsutomu Matsumoto,et al. Human-computer cryptography: an attempt , 1998, CCS '96.
[6] Tzonelih Hwang,et al. On the Matsumoto and Imai's Human Identification Scheme , 1995, EUROCRYPT.
[7] Hideki Imai,et al. Human Identification Through Insecure Channel , 1991, EUROCRYPT.
[8] Zbigniew Golebiewski,et al. Practical Attacks on HB and HB+ Protocols , 2008, IACR Cryptol. ePrint Arch..
[9] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[10] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[11] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[12] Hideki Imai,et al. An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication , 2006, INDOCRYPT.
[13] T. Hwang,et al. On the Matsumoto and Imai human identification scheme , 1995 .
[14] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, Journal of Cryptology.