A Fault Analytic Method against HB+
暂无分享,去创建一个
[1] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[2] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[3] Yannick Seurin. Primitives et protocoles cryptographiques à sécurité prouvée , 2009 .
[4] Yannick Seurin,et al. Good Variants of HB+ Are Hard to Find , 2008, Financial Cryptography.
[5] Ingrid Biehl,et al. Differential Fault Attacks on Elliptic Curve Cryptosystems ( Extended Abstract ) , 2000 .
[6] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[7] Serge Vaudenay,et al. On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.
[8] Kwangjo Kim,et al. Securing HB+ against GRS Man-in-the-Middle Attack , 2007 .
[9] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[10] Michael Hutter,et al. RFID and Its Vulnerability to Faults , 2008, CHES.
[11] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[12] Jorge Munilla,et al. HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.