Survey on recent development about lightweight authentication protocol based on LPN problem
暂无分享,去创建一个
[1] Richard J. Lipton,et al. Cryptographic Primitives Based on Hard Learning Problems , 1993, CRYPTO.
[2] Man Young Sung,et al. HB-MP++ protocol: An ultra light-weight authentication protocol for RFID system , 2009, 2009 IEEE International Conference on RFID.
[3] Shai Halevi,et al. Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population , 2009, ArXiv.
[4] Jorge Munilla,et al. HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.
[5] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[6] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[7] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[8] Jean-Jacques Quisquater,et al. FPGA Implementation of SQUASH , 2008 .
[9] Gildas Avoine,et al. Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly , 2010, RFIDSec.
[10] Refaat M. Mohamed,et al. RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementation , 2011, 2011 5th International Conference on Network and System Security.
[11] Xiaolin Cao,et al. F-HB: An Efficient Forward Private Protocol , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.
[12] Shahram Khazaei,et al. Distinguishing Attack on Grain , 2005 .
[13] Adi Shamir,et al. Un-Trusted-HB: Security Vulnerabilities of Trusted-HB , 2009, IACR Cryptol. ePrint Arch..
[14] Andrew Thangaraj,et al. NLHB: A non-linear Hopper-Blum protocol , 2010, 2010 IEEE International Symposium on Information Theory.
[15] Andrew Thangaraj,et al. NLHB : A light-weight, provably-secure variant of the HB protocol using simple non-linear functions , 2010, 2010 National Conference On Communications (NCC).
[16] Xiaolin Cao,et al. F-HB+: A Scalable Authentication Protocol for Low-Cost RFID Systems , 2011 .
[17] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[18] Xiaowen Zhang,et al. Implementation and performance testing of the SQUASH RFID authentication protocol , 2010, 2010 IEEE Long Island Systems, Applications and Technology Conference.
[19] Cornel Turcu,et al. Current Trends and Challenges in RFID , 2011 .
[20] Mohammad Reza Sohizadeh Abyaneh. On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[21] Tianjie Cao,et al. RFID Protocol Enabling Ownership Transfer to Protect against Traceability and DoS Attacks , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[22] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[23] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[24] Yannick Seurin,et al. HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.
[25] Tsuyoshi Takagi,et al. An Efficient and Secure RFID Security Method with Ownership Transfer , 2006, 2006 International Conference on Computational Intelligence and Security.
[26] Zhou Yong. Design and Analysis of Cryptographic Protocols for RFID , 2006 .
[27] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[28] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[29] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..
[30] Julien Bringer,et al. Trusted-HB: A Low-Cost Version of HB $^+$ Secure Against Man-in-the-Middle Attacks , 2008, IEEE Transactions on Information Theory.
[31] Serge Vaudenay,et al. On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.
[32] Kristiyan Haralambiev,et al. HBN: An HB-like protocol secure against man-in-the-middle attacks , 2011, IACR Cryptol. ePrint Arch..
[33] Xuefei Leng,et al. HB-MP+ Protocol: An Improvement on the HB-MP Protocol , 2008, 2008 IEEE International Conference on RFID.
[34] Fangjun Wu,et al. A Structural Complexity Metric for Software Components , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[35] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.