On Hardware-Oriented Message Authentication with Applications towards RFID
暂无分享,去创建一个
[1] Olivier Billet,et al. Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher , 2010, FSE.
[2] Anne Canteaut,et al. A New Algorithm for Finding Minimum-Weight Words in a Linear Code: Application to McEliece’s Cryptosystem and to Narrow-Sense BCH Codes of Length , 1998 .
[3] Bart Preneel,et al. Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms , 2008, CRYPTO.
[4] Moni Naor,et al. Small-Bias Probability Spaces: Efficient Constructions and Applications , 1993, SIAM J. Comput..
[5] Eyal Kushilevitz,et al. Learning decision trees using the Fourier spectrum , 1991, STOC '91.
[6] Willi Meier,et al. Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.
[7] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[8] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[9] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[10] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[11] Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.
[12] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[13] New Stream Cipher Designs , 2008 .
[14] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[15] Hugo Krawczyk,et al. New Hash Functions For Message Authentication , 1995, EUROCRYPT.
[16] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[17] F. MacWilliams,et al. Codes which detect deception , 1974 .
[18] Hugo Krawczyk,et al. UMAC: Fast and Secure Message Authentication , 1999, CRYPTO.
[19] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[20] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[21] Noga Alon,et al. Simple construction of almost k-wise independent random variables , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.
[22] J. D. Golic. Computation of low-weight parity-check polynomials , 1996 .
[23] Walter T. Penzhorn,et al. Computation of Low-Weight Parity Checks for Correlation Attacks on Stream Ciphers , 1995, IMACC.