-
1
-
-
26444443915
-
-
G. Avoine and P. Oechslin. A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pages 110-114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
-
G. Avoine and P. Oechslin. A scalable and provably secure hash based RFID protocol. In International Workshop on Pervasive Computing and Communication Security - PerSec 2005, pages 110-114, Kauai Island, Hawaii, USA, March 2005. IEEE, IEEE Computer Society Press.
-
-
-
-
2
-
-
38549138054
-
New proofs for NMAC and HMAC: Security without collision-resistance
-
Santa Barbara, California, USA, to appear. IEEE Computer Society
-
th Annual International Cryptology Conference, CRYPTO'06, page 640, Santa Barbara, California, USA, 2006, to appear. IEEE Computer Society.
-
(2006)
th Annual International Cryptology Conference, CRYPTO'06
, pp. 640
-
-
Bellare, M.1
-
3
-
-
84958979095
-
Weierstrass elliptic curves and side-channel attacks
-
Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002
-
E. Brier and M. Joye. Weierstrass elliptic curves and side-channel attacks. In Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, LNCS 2274, pages 335-345, 2002.
-
(2002)
LNCS
, vol.2274
, pp. 335-345
-
-
Brier, E.1
Joye, M.2
-
4
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
Lyon, France, June, IEEE, IEEE Computer Society Press
-
++: a lightweight authentication protocol secure against some attacks. In IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006, Lyon, France, June 2006. IEEE, IEEE Computer Society Press.
-
(2006)
IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU 2006
-
-
Bringer, J.1
Chabanne, H.2
Emmanuelle, D.3
-
5
-
-
55649115408
-
Provably secure ubiquitous systems: Universally composable RFID authentication protocols
-
Baltimore, Maryland, USA, August-September, IEEE
-
M. Burmester, T. v. Le, and B. d. Medeiros. Provably secure ubiquitous systems: Universally composable RFID authentication protocols. In Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm, Baltimore, Maryland, USA, August-September 2006. IEEE.
-
(2006)
Conference on Security and Privacy for Emerging Areas in Communication Networks - SecureComm
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
-
7
-
-
34547630116
-
Secure anonymous RFID authentication protocols
-
Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA
-
C. Chatmon, T. v. Le, and M. Burmester. Secure anonymous RFID authentication protocols. Technical Report TR-060112, Florida State University, Department of Computer Science, Tallahassee, Florida, USA, 2006.
-
(2006)
-
-
Chatmon, C.1
Le, T.V.2
Burmester, M.3
-
8
-
-
33746739905
-
AES implementation on a grain of sand
-
13-20, Ocotber
-
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES implementation on a grain of sand. IEE Proceedings - Information Security, 152(1):13-20, Ocotber 2005.
-
(2005)
IEE Proceedings - Information Security
, vol.152
, Issue.1
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
9
-
-
33144487342
-
An active attack against HB+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive
-
Report 2005/237
-
H. Gilbert, M. Robshaw, and H. Sibert. An active attack against HB+ - a provably secure lightweight authentication protocol. Cryptology ePrint Archive, Report 2005/237, 2005.
-
(2005)
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
13
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
V. Shoup, editor, Advances in Cryptology, CRYPTO'05, of, Santa Barbara, California, USA, August
-
A. Juels and S. Weis. Authenticating pervasive devices with human protocols. In V. Shoup, editor, Advances in Cryptology - CRYPTO'05, volume 3126 of LNCS, pages 293-308, Santa Barbara, California, USA, August 2005.
-
(2005)
LNCS
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
17
-
-
36249031858
-
HB and related lightweight authentication protocols for secure RFID tag/reader authentication
-
Basel, Switzerland, June
-
S. Piramuthu. HB and related lightweight authentication protocols for secure RFID tag/reader authentication. In Collaborative Electronic Commerce Technology and Research - CoIlECTeR 2006, Basel, Switzerland, June 2006.
-
(2006)
Collaborative Electronic Commerce Technology and Research - CoIlECTeR 2006
-
-
Piramuthu, S.1
-
18
-
-
33750290259
-
YA-TRAP: Yet another trivial RFID authentication protocol
-
Washington, DC, USA, IEEE Computer Society
-
G. Tsudik. YA-TRAP: Yet another trivial RFID authentication protocol. In PERCOMW '06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, page 640, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
PERCOMW '06: Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 640
-
-
Tsudik, G.1
|