-
1
-
-
34547692002
-
-
EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz, 960 MHz Version 1.0.9 2005
-
EPCglobal, "EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 1.0.9" 2005.
-
-
-
-
2
-
-
80052017185
-
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
-
Proc. of CRYPTO'87, Springer-Verlag
-
C.M. Adams and H. Meijer, "Security-Related Comments Regarding McEliece's Public-Key Cryptosystem". In Proc. of CRYPTO'87, LNCS 293, pp.224-228, Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.293
, pp. 224-228
-
-
Adams, C.M.1
Meijer, H.2
-
3
-
-
84958666890
-
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
-
Proc. of CRYPTO'97, Springer-Verlag
-
T. Berson, "Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack". In Proc. of CRYPTO'97, LNCS 1294, pp.213-220, Springer-Verlag, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 213-220
-
-
Berson, T.1
-
4
-
-
35048859848
-
Strong Authentication for RFID Systems using the AES Algorithm
-
Proc. of CHES'04, Springer-Verlag
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. "Strong Authentication for RFID Systems using the AES Algorithm". In Proc. of CHES'04, LNCS 3156, pp.357-370, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
5
-
-
84998808084
-
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
-
Proc. of INDOCRYPT'06, Springer-Verlag
-
M.P.C Fossorier, M.J. Mihaljevic, H. Imai, Y. Cui and K. Matsuura. "A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication". In Proc. of INDOCRYPT'06, LNCS 4329, pp.48-62, Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4329
, pp. 48-62
-
-
Fossorier, M.P.C.1
Mihaljevic, M.J.2
Imai, H.3
Cui, Y.4
Matsuura, K.5
-
6
-
-
70349284581
-
Secure Human Identification Protocols
-
Proc. of ASIACRYPT'01, Springer-Verlag
-
N.J. Hopper and M. Blum. "Secure Human Identification Protocols". In Proc. of ASIACRYPT'01, LNCS 2248, pp.52-66, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
7
-
-
18744409344
-
The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy
-
V. Atluri, ed, ACM Press
-
A. Juels, R.L. Rivest and M. Szydlo, "The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy". In V. Atluri, (ed.), 8th ACM Conference on Computer and Communications Security, pp.103-111, ACM Press, 2003.
-
(2003)
8th ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
8
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Proc. of CRYPTO'05, Springer-Verlag
-
A. Juels and S.A. Weis, "Authenticating Pervasive Devices with Human Protocols". In Proc. of CRYPTO'05, LNCS 3621, pp.292-308, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 292-308
-
-
Juels, A.1
Weis, S.A.2
-
9
-
-
84937393537
-
Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC
-
Proc. of PKC'01, Springer-Verlag
-
K. Kobara and H. Imai, "Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC". In Proc. of PKC'01, LNCS 1992, pp.19-35, Springer-Verlag, 2001.
-
(1992)
LNCS
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
10
-
-
85034651324
-
An Observation on the Security of McEliece's Public-Key Cryptosystem
-
Proc. of EU-ROCRYPTO'88, Springer-Verlag
-
P.J. Lee and E.F. Brickell, "An Observation on the Security of McEliece's Public-Key Cryptosystem". In Proc. of EU-ROCRYPTO'88, LNCS 330, pp.275-280, Springer-Verlag, 1988.
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
11
-
-
0022582790
-
Knapsack-type Cryptosystems and Algebraic Coding Theory
-
H. Niederreiter, "Knapsack-type Cryptosystems and Algebraic Coding Theory". Problems of Control and Information Theory, vol.15, no.2, pp.159-166, 1986.
-
(1986)
Problems of Control and Information Theory
, vol.15
, Issue.2
, pp. 159-166
-
-
Niederreiter, H.1
-
13
-
-
34548142603
-
Privacy Enhancd and Light Weight RFID System without Tag Synchronization and Exhaustive Search
-
Man, and Cybernetics
-
M. Suzuki, K. Kobara and H. Imai, "Privacy Enhancd and Light Weight RFID System without Tag Synchronization and Exhaustive Search". In Proc. of 2006 IEEE International Conference on Systems, Man, and Cybernetics, 2006.
-
(2006)
Proc. of 2006 IEEE International Conference on Systems
-
-
Suzuki, M.1
Kobara, K.2
Imai, H.3
-
14
-
-
2942614621
-
Security and Privacy in Radio-Frequency Identification Devices
-
Master Thesis, MIT
-
S.A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Master Thesis, MIT, 2003.
-
(2003)
-
-
Weis, S.A.1
|