Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack
暂无分享,去创建一个
Kazukuni Kobara | Hideki Imai | Yang Cui | Kanta Matsuura | H. Imai | K. Kobara | Yang Cui | Kanta Matsuura
[1] Kazukuni Kobara,et al. Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[2] Hideki Imai,et al. A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication , 2006, IACR Cryptol. ePrint Arch..
[3] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[4] Kazukuni Kobara,et al. Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC , 2001, Public Key Cryptography.
[5] Thomas A. Berson,et al. Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack , 1997, CRYPTO.
[6] Ernest F. Brickell,et al. An Observation on the Security of McEliece's Public-Key Cryptosystem , 1988, EUROCRYPT.
[7] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[8] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[9] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[10] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[11] Henk Meijer,et al. Security-related comments regarding McEliece's public-key cryptosystem , 1989, IEEE Trans. Inf. Theory.
[12] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.