메뉴 건너뛰기




Volumn , Issue , 2007, Pages 223-228

Lightweight asymmetric privacy-preserving authentication protocols secure against active attack

Author keywords

Active attack; Asymmetric; Lightweight authentication protocol

Indexed keywords

ACTIVE ATTACKS; LIGHTWEIGHT AUTHENTICATION PROTOCOL; RADIO FREQUENCY IDENTIFICATION DEVICES (RFID);

EID: 34547653526     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOMW.2007.60     Document Type: Conference Paper
Times cited : (19)

References (14)
  • 1
    • 34547692002 scopus 로고    scopus 로고
    • EPCglobal, EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz, 960 MHz Version 1.0.9 2005
    • EPCglobal, "EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz - 960 MHz Version 1.0.9" 2005.
  • 2
    • 80052017185 scopus 로고
    • Security-Related Comments Regarding McEliece's Public-Key Cryptosystem
    • Proc. of CRYPTO'87, Springer-Verlag
    • C.M. Adams and H. Meijer, "Security-Related Comments Regarding McEliece's Public-Key Cryptosystem". In Proc. of CRYPTO'87, LNCS 293, pp.224-228, Springer-Verlag, 1988.
    • (1988) LNCS , vol.293 , pp. 224-228
    • Adams, C.M.1    Meijer, H.2
  • 3
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
    • Proc. of CRYPTO'97, Springer-Verlag
    • T. Berson, "Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack". In Proc. of CRYPTO'97, LNCS 1294, pp.213-220, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 213-220
    • Berson, T.1
  • 4
    • 35048859848 scopus 로고    scopus 로고
    • Strong Authentication for RFID Systems using the AES Algorithm
    • Proc. of CHES'04, Springer-Verlag
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. "Strong Authentication for RFID Systems using the AES Algorithm". In Proc. of CHES'04, LNCS 3156, pp.357-370, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 5
    • 84998808084 scopus 로고    scopus 로고
    • A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication
    • Proc. of INDOCRYPT'06, Springer-Verlag
    • M.P.C Fossorier, M.J. Mihaljevic, H. Imai, Y. Cui and K. Matsuura. "A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication". In Proc. of INDOCRYPT'06, LNCS 4329, pp.48-62, Springer-Verlag, 2006.
    • (2006) LNCS , vol.4329 , pp. 48-62
    • Fossorier, M.P.C.1    Mihaljevic, M.J.2    Imai, H.3    Cui, Y.4    Matsuura, K.5
  • 6
    • 70349284581 scopus 로고    scopus 로고
    • Secure Human Identification Protocols
    • Proc. of ASIACRYPT'01, Springer-Verlag
    • N.J. Hopper and M. Blum. "Secure Human Identification Protocols". In Proc. of ASIACRYPT'01, LNCS 2248, pp.52-66, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 8
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Proc. of CRYPTO'05, Springer-Verlag
    • A. Juels and S.A. Weis, "Authenticating Pervasive Devices with Human Protocols". In Proc. of CRYPTO'05, LNCS 3621, pp.292-308, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 292-308
    • Juels, A.1    Weis, S.A.2
  • 9
    • 84937393537 scopus 로고
    • Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC
    • Proc. of PKC'01, Springer-Verlag
    • K. Kobara and H. Imai, "Semantically Secure McEliece Public-Key Cryptosystems - Conversions for McEliece PKC". In Proc. of PKC'01, LNCS 1992, pp.19-35, Springer-Verlag, 2001.
    • (1992) LNCS , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 10
    • 85034651324 scopus 로고
    • An Observation on the Security of McEliece's Public-Key Cryptosystem
    • Proc. of EU-ROCRYPTO'88, Springer-Verlag
    • P.J. Lee and E.F. Brickell, "An Observation on the Security of McEliece's Public-Key Cryptosystem". In Proc. of EU-ROCRYPTO'88, LNCS 330, pp.275-280, Springer-Verlag, 1988.
    • (1988) LNCS , vol.330 , pp. 275-280
    • Lee, P.J.1    Brickell, E.F.2
  • 11
    • 0022582790 scopus 로고
    • Knapsack-type Cryptosystems and Algebraic Coding Theory
    • H. Niederreiter, "Knapsack-type Cryptosystems and Algebraic Coding Theory". Problems of Control and Information Theory, vol.15, no.2, pp.159-166, 1986.
    • (1986) Problems of Control and Information Theory , vol.15 , Issue.2 , pp. 159-166
    • Niederreiter, H.1
  • 13
    • 34548142603 scopus 로고    scopus 로고
    • Privacy Enhancd and Light Weight RFID System without Tag Synchronization and Exhaustive Search
    • Man, and Cybernetics
    • M. Suzuki, K. Kobara and H. Imai, "Privacy Enhancd and Light Weight RFID System without Tag Synchronization and Exhaustive Search". In Proc. of 2006 IEEE International Conference on Systems, Man, and Cybernetics, 2006.
    • (2006) Proc. of 2006 IEEE International Conference on Systems
    • Suzuki, M.1    Kobara, K.2    Imai, H.3
  • 14
    • 2942614621 scopus 로고    scopus 로고
    • Security and Privacy in Radio-Frequency Identification Devices
    • Master Thesis, MIT
    • S.A. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Master Thesis, MIT, 2003.
    • (2003)
    • Weis, S.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.