-
1
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
International Workshop on Security Protocols
-
ANDERSON, R., AND KUHN, M. Low Cost Attacks on Tamper Resistant Devices. In International Workshop on Security Protocols (1997), vol. 1361 of Lecture Notes in Computer Science, pp. 125-136.
-
(1997)
Lecture Notes in Computer Science
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
2
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
BERLEKAMP, E. R., MCELIECE, R. J., AND TILBORG, V. On the Inherent Intractability of Certain Coding Problems. IEEE Transactions on Information Theory 24 (1978), 384-386.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 384-386
-
-
Berlekamp, E.R.1
Mceliece, R.J.2
Tilborg, V.3
-
3
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Advances in Cryptology - CRYPTO'93 (1994)
-
BLUM, A., FURST, M., KEARNS, M., AND LIPTON, R. J. Cryptographic Primitives Based on Hard Learning Problems. In Advances in Cryptology - CRYPTO'93 (1994), vol. 773 of Lecture Notes in Computer Science, pp. 278-291.
-
Lecture Notes in Computer Science
, vol.773
, pp. 278-291
-
-
Blum, A.1
Furst, M.2
Kearns, M.3
Lipton, R.J.4
-
4
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
July
-
BLUM, A., KALAI, A., AND WASSERMAN, H. Noise-Tolerant Learning, the Parity Problem, and the Statistical Query Model. Journal of the ACM 50, 4 (July 2003), 506-519.
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
5
-
-
0025022876
-
Self-testing/correcting with applications to numerical problems
-
BLUM, M., LUBY, M., AND RUBINFELD, R. Self-Testing/Correcting with Applications to Numerical Problems. In Symposium on Theory of Computation (1990), pp. 73-83.
-
(1990)
Symposium on Theory of Computation
, pp. 73-83
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
6
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
To appear
-
BONO, S., GREEN, M., STUBBLEFIELD, A., JUELS, A., RUBIN, A., AND SZYDLO, M. Security Analysis of a Cryptographically-Enabled RFID Device. In USENIX Security (2005). To appear. Available at http://rfidanalysis.org/.
-
(2005)
USENIX Security
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
7
-
-
84948963042
-
On the security of some cryptosystems based on error-correcting codes
-
Advances in Cryptology - EUROCRYPT
-
CHABAUD, F. On the Security of Some Cryptosystems Based on Error-Correcting Codes. In Advances in Cryptology - EUROCRYPT (1995), vol. 950 of Lecture Notes in Computer Science, pp. 131-139.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 131-139
-
-
Chabaud, F.1
-
8
-
-
84929461941
-
How to achieve a McEliece-based digital signature scheme
-
Advances in Cryptology - ASIACRYPT
-
COURTOIS, N., FINIASZ, M., AND SENDRIER, N. How to Achieve a McEliece-based Digital Signature Scheme. In Advances in Cryptology - ASIACRYPT (2001), vol. 2248 of Lecture Notes in Computer Science, pp. 157-174.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 157-174
-
-
Courtois, N.1
Finiasz, M.2
Sendrier, N.3
-
9
-
-
0042851681
-
The minimal disagreement parity problem as a hard satisfiability problem
-
Computational Intelligence Research Laboratory and AT&T Bell Labs, February
-
CRAWFORD, J. M., KEARNS, M. J., AND SHAPIRE, R. E. The Minimal Disagreement Parity Problem as a Hard Satisfiability Problem. Tech. rep., Computational Intelligence Research Laboratory and AT&T Bell Labs, February 1994.
-
(1994)
Tech. Rep.
-
-
Crawford, J.M.1
Kearns, M.J.2
Shapire, R.E.3
-
10
-
-
33745134577
-
-
EPCGLOBAL. Website. http://www.epcglobalinc.org/, 2005.
-
(2005)
-
-
-
12
-
-
35048881133
-
Issues with RFID usage in ubiquitous computing applications
-
Pervasive Computing (PERVASIVE)
-
FLOERKEMEIER, C., AND LAMPE, M. Issues with RFID Usage in Ubiquitous Computing Applications. In Pervasive Computing (PERVASIVE) (2004), vol. 3001 of Lecture Notes in Computer Science, pp. 188-193.
-
(2004)
Lecture Notes in Computer Science
, vol.3001
, pp. 188-193
-
-
Floerkemeier, C.1
Lampe, M.2
-
13
-
-
21744453249
-
Combating counterfeit drugs
-
US Department of Health and Human Services, Rockville, Maryland, Februrary
-
FOOD AND DRUG ADMINISTRATION. Combating counterfeit drugs. Tech. rep., US Department of Health and Human Services, Rockville, Maryland, Februrary 2004.
-
(2004)
Tech. Rep.
-
-
-
14
-
-
0030671781
-
Some optimal inapproximability results
-
HÅSTAD, J. Some Optimal Inapproximability Results. In Symposium on Theory of Computing (1997), pp. 1-10.
-
(1997)
Symposium on Theory of Computing
, pp. 1-10
-
-
Håstad, J.1
-
15
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
IEEE Computer Society
-
HENRICI, D., AND MÜLLER, P. Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In Pervasive Computing and Communications (PerCom) (2004), IEEE Computer Society, pp. 149-153.
-
(2004)
Pervasive Computing and Communications (PerCom)
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
16
-
-
14844324416
-
A secure human-computer authentication scheme
-
Carnegie Mellon University
-
HOPPER, N., AND BLUM, M. A Secure Human-Computer Authentication Scheme. Tech. Rep. CMU-CS-00-139, Carnegie Mellon University, 2000.
-
(2000)
Tech. Rep.
, vol.CMU-CS-00-139
-
-
Hopper, N.1
Blum, M.2
-
17
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - ASIA CRYPT (2001)
-
HOPPER, N. J., AND BLUM, M. Secure Human Identification Protocols. In Advances in Cryptology - ASIA CRYPT (2001), vol. 2248 of Lecture Notes in Computer Science, pp. 52-66.
-
Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
18
-
-
23944476196
-
Minimalist cryptography for RFID tags
-
Security in Communication Networks C. Blundo and S. Cimato, Eds., Springer-Verlag
-
JUELS, A. Minimalist Cryptography for RFID Tags. In Security in Communication Networks (2004), C. Blundo and S. Cimato, Eds., vol. 3352 of Lecture Notes in Computer Science, Springer-Verlag, pp. 149-164.
-
(2004)
Lecture Notes in Computer Science
, vol.3352
, pp. 149-164
-
-
Juels, A.1
-
20
-
-
35248832722
-
Squealing euros: Privacy protection in RFID-enabled banknotes
-
Financial Cryptography
-
JUELS, A., AND PAPPU, R. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In Financial Cryptography (2003), vol. 2742 of Lecture Notes in Computer Science, pp. 103-121.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
21
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
ACM Press
-
JUELS, A., RIVEST, R. L., AND SZYDLO, M. The blocker tag: selective blocking of RFID tags for consumer privacy. In Proceedings of the 10th ACM conference on Computer and communication security (2003), ACM Press, pp. 103-111.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
22
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
November
-
KEARNS, M. Efficient Noise-Tolerant Learning from Statistical Queries. Journal of the ACM 45, 6 (November 1998), 983-1006.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
24
-
-
33745119673
-
MIT proximity card vulnerabilities
-
Massachusetts Institute of Technology, March
-
MANDEL, J., ROACH, A., AND WINSTEIN, K. MIT Proximity Card Vulnerabilities. Tech. rep., Massachusetts Institute of Technology, March 2004.
-
(2004)
Tech. Rep.
-
-
Mandel, J.1
Roach, A.2
Winstein, K.3
-
25
-
-
0029712968
-
Human-computer cryptography: An attempt
-
ACM Press
-
MATSUMOTO, T. Human-computer Cryptography: An Attempt. In Computer and Communications Security (1996), ACM Press, pp. 68-75.
-
(1996)
Computer and Communications Security
, pp. 68-75
-
-
Matsumoto, T.1
-
26
-
-
84995399871
-
Human identification through insecure channel
-
Advances in Cryptology - EUROCRYPT (1991)
-
MATSUMOTO, T., AND IMAI, H. Human Identification through Insecure Channel. In Advances in Cryptology - EUROCRYPT (1991), vol. 547 of Lecture Notes in Computer Science, pp. 409-421.
-
Lecture Notes in Computer Science
, vol.547
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
28
-
-
39749093168
-
The magical number seven, plus or minus two: Some limits on our capacity for processing information
-
MILLER, G. A. The Magical Number Seven, Plus or Minus Two: Some Limits on Our Capacity for Processing Information. Psychological Review 63 (1956), 81-97.
-
(1956)
Psychological Review
, vol.63
, pp. 81-97
-
-
Miller, G.A.1
-
29
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
B. Pfitzmann and P. McDaniel, Eds., ACM
-
MOLNAR, D., AND WAGNER, D. Privacy and Security in Library RFID : Issues, Practices, and Architectures. In Computer and Communications Security (2004), B. Pfitzmann and P. McDaniel, Eds., ACM, pp. 210-219.
-
(2004)
Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
30
-
-
84958648410
-
Visual authentication and identification
-
Advances in Cryptology - CRYPTO (1997)
-
NAOR, M., AND PINKAS, B. Visual Authentication and Identification. In Advances in Cryptology - CRYPTO (1997), vol. 1294 of Lecture Notes in Computer Science, pp. 322-336.
-
Lecture Notes in Computer Science
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
31
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
NIEDERREITER, H. Knapsack-Type Cryptosystems and Algebraic Coding Theory. Problems of Control and Information Theory 15, 1 (1986), 159-166.
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.1
, pp. 159-166
-
-
Niederreiter, H.1
-
33
-
-
35248872610
-
RFID systems and security and privacy implications
-
Lecture Notes in Computer Science
-
SARMA, S. E., WEIS, S. A., AND ENGELS, D. W. RFID Systems and Security and Privacy Implications. In Workshop on Cryptographic Hardware and Embedded Systems (2002), vol. 2523, Lecture Notes in Computer Science, pp. 454-470.
-
(2002)
Workshop on Cryptographic Hardware and Embedded Systems
, vol.2523
, pp. 454-470
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
35
-
-
0030283873
-
A new paradigm for public key identification
-
STERN, J. A New Paradigm for Public Key Identification. IEEE Transactions on Information Theory 42, 6 (1996), 1757-1768.
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.6
, pp. 1757-1768
-
-
Stern, J.1
-
37
-
-
33745135628
-
-
VERICHIP. Website. http://www.4verichip.com/, 2005.
-
(2005)
-
-
-
38
-
-
84957372142
-
On the matsumoto and Imai's Human identification scheme
-
EuroCrypt'95
-
WANG, C.-H., HWANG, T., AND TSAI, J.-J. On the Matsumoto and Imai's Human Identification Scheme. In EuroCrypt '95 (1995), vol. 921 of Lecture Notes in Computer Science, pp. 382-392.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 382-392
-
-
Wang, C.-H.1
Hwang, T.2
Tsai, J.-J.3
-
39
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Security in Pervasive Computing
-
WEIS, S. A., SARMA, S. E., RIVEST, R. L., AND ENGELS, D. W. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing (2004), vol. 2802 of Lecture Notes in Computer Science, pp. 201-212.
-
(2004)
Lecture Notes in Computer Science
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|