-
1
-
-
38349081055
-
-
Aumasson, J.-Ph., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: a Hardware-Oriented Trapdoor Cipher. In: Information Security and Privacy (ACISP 2007), Townsville, Australia. LNCS, 4586, pp. 184-199. Springer, Heidelberg (2007)
-
Aumasson, J.-Ph., Finiasz, M., Meier, W., Vaudenay, S.: TCHo: a Hardware-Oriented Trapdoor Cipher. In: Information Security and Privacy (ACISP 2007), Townsville, Australia. LNCS, vol. 4586, pp. 184-199. Springer, Heidelberg (2007)
-
-
-
-
3
-
-
33745621564
-
-
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, 3897, pp. 291-306. Springer, Heidelberg (2006)
-
Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol. 3897, pp. 291-306. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
26444478592
-
-
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 125-140. Springer, Heidelberg (2005)
-
Avoine, G., Oechslin, P.: RFID Traceability: A Multilayer Problem. In: Patrick, A.S., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 125-140. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
38149093695
-
-
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Security and Privacy in Ad-Hoc and Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, 4357, Springer, Heidelberg (2006)
-
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Security and Privacy in Ad-Hoc and Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, Springer, Heidelberg (2006)
-
-
-
-
6
-
-
84957629783
-
Relations Among Notions of Security for Public-Key Encryption Schemes
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
8
-
-
50049108255
-
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
-
Baltimore, MA, USA, IEEE, Los Alamitos
-
Burmester, M., van Le, T., de Medeiros, B.: Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In: SecureComm 2006. Conference on Security and Privacy for Emerging Areas in Communication Networks, Baltimore, MA, USA, IEEE, Los Alamitos (2006)
-
(2006)
SecureComm 2006. Conference on Security and Privacy for Emerging Areas in Communication Networks
-
-
Burmester, M.1
van Le, T.2
de Medeiros, B.3
-
9
-
-
33745771966
-
Low-Cost Cryptography for Privacy in RFID Systems
-
Domingo-Ferrer, J, Posegga, J, Schreckling, D, eds, CARDIS 2006, Springer, Heidelberg
-
Calmels, B., Canard, S., Girault, M., Sibert, H.: Low-Cost Cryptography for Privacy in RFID Systems. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 237-251. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3928
, pp. 237-251
-
-
Calmels, B.1
Canard, S.2
Girault, M.3
Sibert, H.4
-
10
-
-
38149006640
-
-
Damgård, I., Østergaard, M.: RFID Security: Tradeoffs between Security and Efficiency. Technical report 2006/234, IACR (2006), http://eprint.iacr.org/2006/234
-
Damgård, I., Østergaard, M.: RFID Security: Tradeoffs between Security and Efficiency. Technical report 2006/234, IACR (2006), http://eprint.iacr.org/2006/234
-
-
-
-
12
-
-
33847330246
-
A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks
-
Athens, Greece, IEEE, Los Alamitos
-
Dimitriou, T.: A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks. In: SecureComm 2005. Conference on Security and Privacy for Emerging Areas in Communication Networks, Athens, Greece, IEEE, Los Alamitos (2005), http://ieeexplore.ieee.org/iel5/10695/33755/01607559.pdf? arnumber=1607559
-
(2005)
SecureComm 2005. Conference on Security and Privacy for Emerging Areas in Communication Networks
-
-
Dimitriou, T.1
-
13
-
-
85028450627
-
Non-Malleable Cryptography
-
New Orleans, Louisiana, U.S.A, pp, ACM Press, New York
-
Dolev, D., Dwork, C., Naor, M.: Non-Malleable Cryptography. In: Proceedings of the 23rd ACM Symposium on Theory of Computing, New Orleans, Louisiana, U.S.A, pp. 542-552. ACM Press, New York (1991)
-
(1991)
Proceedings of the 23rd ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
14
-
-
35048859848
-
-
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 357-370. Springer, Heidelberg (2004)
-
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)
-
-
-
-
15
-
-
33845429016
-
-
Feldhofer, M., Rechberger, C.: A Case against Currently used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, 4277, pp. 372-381. Springer, Heidelberg (2006)
-
Feldhofer, M., Rechberger, C.: A Case against Currently used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. LNCS, vol. 4277, pp. 372-381. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
34547417640
-
When Stream Cipher Analysis Meets Public-Key Cryptography (Invited Talk.)
-
Proceedings of SAC, Springer, Heidelberg
-
Finiasz, M., Vaudenay, S.: When Stream Cipher Analysis Meets Public-Key Cryptography (Invited Talk.). In: Proceedings of SAC 2006. LNCS, Springer, Heidelberg (2006)
-
(2006)
LNCS
-
-
Finiasz, M.1
Vaudenay, S.2
-
17
-
-
27644472569
-
An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol
-
Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol. IEE Electronic Letters 41, 1169-1170 (2005)
-
(2005)
IEE Electronic Letters
, vol.41
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
18
-
-
35048879274
-
-
Girault, M., Lefranc, D.: Public Key Authentication with One (Online) Single Addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 413-427. Springer, Heidelberg (2004)
-
Girault, M., Lefranc, D.: Public Key Authentication with One (Online) Single Addition. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 413-427. Springer, Heidelberg (2004)
-
-
-
-
19
-
-
33749561582
-
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
-
Girault, M., Poupard, G., Stern, J.: On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order. Journal of Cryptology 19, 463-487 (2006)
-
(2006)
Journal of Cryptology
, vol.19
, pp. 463-487
-
-
Girault, M.1
Poupard, G.2
Stern, J.3
-
21
-
-
38049181728
-
Detecting Rogue Devices in Bluetooth Networks using Radio Frequency Fingerprinting
-
Lima, Peru, pp, IASTED/ACTA Press
-
Hall, J., Barbeau, M., Kranakis, E.: Detecting Rogue Devices in Bluetooth Networks using Radio Frequency Fingerprinting. In: Proceedings of the Third IASTED International Conference on Communications and Computer Networks (CCN 2006), Lima, Peru, pp. 108-113. IASTED/ACTA Press (2006)
-
(2006)
Proceedings of the Third IASTED International Conference on Communications and Computer Networks (CCN
, pp. 108-113
-
-
Hall, J.1
Barbeau, M.2
Kranakis, E.3
-
22
-
-
0009342582
-
Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards. Part 3: Initialization and Anticollision. ISO
-
ISO/IEC 14443-3
-
ISO/IEC 14443-3. Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards. Part 3: Initialization and Anticollision. ISO (2001)
-
(2001)
-
-
-
23
-
-
33745181952
-
Authenticating Pervasive Devices with human Protocols
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Juels, A., Weis, S.: Authenticating Pervasive Devices with human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
24
-
-
34748832806
-
Defining Strong Privacy for RFID
-
Technical report 2006/137, IACR
-
Juels, A., Weis, S.: Defining Strong Privacy for RFID. Technical report 2006/137, IACR (2006), http://eprint.iacr.org/2006/137
-
(2006)
-
-
Juels, A.1
Weis, S.2
-
25
-
-
33746104831
-
Parallel and Concurrent Security of the HB and HB+ Protocols
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Katz, J., Shin, J.S.: Parallel and Concurrent Security of the HB and HB+ Protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73-87. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
26
-
-
34748848124
-
Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange
-
Singapore, pp, ACM, New York
-
van Le, T., Burmester, M., de Medeiros, B.: Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange. In: ASIACCS 2007. Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, Singapore, pp. 242-252. ACM, New York (2007)
-
(2007)
ASIACCS 2007. Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security
, pp. 242-252
-
-
van Le, T.1
Burmester, M.2
de Medeiros, B.3
-
27
-
-
84977783611
-
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
-
Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
28
-
-
14844294769
-
Privacy and Security in Library RFID: Issues, Practices, and Architectures
-
Washington, DC, USA, pp, ACM Press, New York
-
Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, pp. 210-219. ACM Press, New York (2004)
-
(2004)
11th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
29
-
-
0024983231
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
-
Baltimore, Maryland, U.S.A, pp, ACM Press, New York
-
Naor, M., Yung, M.: Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: Proceedings of the 22nd ACM Symposium on Theory of Computing, Baltimore, Maryland, U.S.A, pp. 427-437. ACM Press, New York (1990)
-
(1990)
Proceedings of the 22nd ACM Symposium on Theory of Computing
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
30
-
-
24944575863
-
Cryptographic Approach to a Privacy Friendly Tag
-
Presented at the, MIT, USA
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to a Privacy Friendly Tag. In: Presented at the RFID Privacy Workshop, MIT, USA (2003)
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
31
-
-
38149060413
-
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain based RFID Privacy Protection Scheme. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, 3205, Springer, Heidelberg (2004)
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain based RFID Privacy Protection Scheme. In: Davies, N., Mynatt, E.D., Siio, I. (eds.) UbiComp 2004. LNCS, vol. 3205, Springer, Heidelberg (2004)
-
-
-
-
32
-
-
25444432606
-
RFID Privacy Issues and Technical Challenges
-
Ohkubo, M., Suzuki, K.: RFID Privacy Issues and Technical Challenges. Communications of the ACM 48, 66-71 (2005)
-
(2005)
Communications of the ACM
, vol.48
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
-
34
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Rackoff, C., Simon, D.: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
-
-
Rackoff, C.1
Simon, D.2
-
35
-
-
84887313979
-
Searching for Compact Algorithms: CGEN
-
Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Robshaw, M.J.B.: Searching for Compact Algorithms: CGEN. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 37-49. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 37-49
-
-
Robshaw, M.J.B.1
-
36
-
-
85029486638
-
The Use of Interaction in Public Cryptosystems
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Rudich, S.: The Use of Interaction in Public Cryptosystems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 242-251. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 242-251
-
-
Rudich, S.1
-
37
-
-
33745142417
-
Sequences of Games: A Tool for Taming Complexity in Security Proofs
-
Technical report 2004/332, IACR
-
Shoup, V.: Sequences of Games: A Tool for Taming Complexity in Security Proofs. Technical report 2004/332, IACR (2004), http://eprint.iacr.org/2004/332
-
(2004)
-
-
Shoup, V.1
-
38
-
-
34547414125
-
RFID Privacy based on Public-Key Cryptography (Invited Talk)
-
Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
-
Vaudenay, S.: RFID Privacy based on Public-Key Cryptography (Invited Talk). In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 1-6. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4296
, pp. 1-6
-
-
Vaudenay, S.1
-
39
-
-
35048876270
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 454-469. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|