-
3
-
-
84873466407
-
Authenticated Key Exchange Secure against Dictionary Attacks
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
4
-
-
0035163054
-
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Proc. IEEE FOCS 2001, pp. 136-145 (2001) Full version available at IACR ePrint Archive (last revised, 13 December 2005), http://eprint.iacr.org/2000/067
-
Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Proc. IEEE FOCS 2001, pp. 136-145 (2001) Full version available at IACR ePrint Archive (last revised, 13 December 2005), http://eprint.iacr.org/2000/067
-
-
-
-
5
-
-
38049173955
-
-
Carluccio, D., Lemke, K., Paar, C.: E-Passport: The Global Traceability or How to Feel Like a UPS Package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, 4298, pp. 391-404. Springer, Heidelberg (2007)
-
Carluccio, D., Lemke, K., Paar, C.: E-Passport: The Global Traceability or How to Feel Like a UPS Package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, vol. 4298, pp. 391-404. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
45749101241
-
-
CASPIAN, Boycott Benetton (accessed 19, September 2007), http://www. boycottbenetton.com
-
CASPIAN, Boycott Benetton (accessed 19, September 2007), http://www. boycottbenetton.com
-
-
-
-
7
-
-
33845638668
-
Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting
-
Choo, K.-K.R.: Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. In: Proceedings of IEEE CSFW 2006, pp. 297-308 (2006)
-
(2006)
Proceedings of IEEE
, vol.CSFW 2006
, pp. 297-308
-
-
Choo, K.-K.R.1
-
8
-
-
26444442332
-
-
Choo, K.-K.R., Hitchcock, Y.: Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 429-442. Springer, Heidelberg (2005)
-
Choo, K.-K.R., Hitchcock, Y.: Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 429-442. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
33646180371
-
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably-Secure Key Establishment Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 116-131. Springer, Heidelberg (2005)
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably-Secure Key Establishment Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 116-131. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
33646805409
-
Examining Indistinguishability- based Proof Models for Key Establishment Protocols
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
11
-
-
33646779184
-
Errors in Computational Complexity Proofs for Protocols
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Errors in Computational Complexity Proofs for Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 624-643. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 624-643
-
-
Choo, K.-K.R.1
Boyd, C.2
Hitchcock, Y.3
-
12
-
-
23944475681
-
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y., Maitland, G.: On Session Identifiers in Provably Secure Protocols. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 351-366. Springer, Heidelberg (2005)
-
Choo, K.-K.R., Boyd, C., Hitchcock, Y., Maitland, G.: On Session Identifiers in Provably Secure Protocols. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 351-366. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
38549131714
-
Vulnerabilities in First-Generation RFID-enabled Credit Cards
-
Proceedings of Financial Cryptography, Springer, Heidelberg
-
Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O'Hare, T.: Vulnerabilities in First-Generation RFID-enabled Credit Cards. In: Proceedings of Financial Cryptography 2007. LNCS, vol. 4886, pp. 2-14. Springer, Heidelberg (2008)
-
(2007)
LNCS
, vol.4886
, pp. 2-14
-
-
Heydt-Benjamin, T.S.1
Bailey, D.V.2
Fu, K.3
Juels, A.4
O'Hare, T.5
-
14
-
-
33845240394
-
-
Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 152-167. Springer, Heidelberg (2006)
-
Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152-167. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
33847249519
-
-
Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proceedings of SecureComm 2005, pp. 74-88 (2007) Full version available at IACR ePrint Archive (last revised 18 September 2007), http://eprint.iacr.org/2005/095
-
Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proceedings of SecureComm 2005, pp. 74-88 (2007) Full version available at IACR ePrint Archive (last revised 18 September 2007), http://eprint.iacr.org/2005/095
-
-
-
-
16
-
-
34547687590
-
-
Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. In: Proceedings of PerCom 2007, April 7, 2006, pp. 342-347 (2007) Full version available at IACR ePrint Archive http://eprint.iacr.org/2006/137
-
Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. In: Proceedings of PerCom 2007, April 7, 2006, pp. 342-347 (2007) Full version available at IACR ePrint Archive http://eprint.iacr.org/2006/137
-
-
-
-
17
-
-
36349031223
-
An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports
-
IFIP
-
Kosta, E., Meints, M., Hensen, M., Gasson, M.: An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports. In: Proceedings of IFIP SEC 2007, IFIP 232, pp. 467-472 (2007)
-
(2007)
Proceedings of IFIP SEC
, vol.232
, pp. 467-472
-
-
Kosta, E.1
Meints, M.2
Hensen, M.3
Gasson, M.4
-
18
-
-
34748848124
-
-
Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proceedings of ASIACCS 2007, February 14, 2007, pp. 242-252 (2007); Full version titled Forward-Secure RFID Authentication and Key Exchange, IACR ePrint Archive, http://eprint.iacr.org/2007/051,
-
Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proceedings of ASIACCS 2007, February 14, 2007, pp. 242-252 (2007); Full version titled Forward-Secure RFID Authentication and Key Exchange, IACR ePrint Archive, http://eprint.iacr.org/2007/051,
-
-
-
-
19
-
-
84977783611
-
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
-
Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 1-20
-
-
Lim, C.H.1
Kwon, T.2
-
22
-
-
41549168688
-
About Machine-Readable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication
-
Monnerat, J., Vaudenay, S., Vuagnoux, M.: About Machine-Readable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication. In: Proceedings of RFIDSec 2007, pp. 15-28 (2007)
-
(2007)
Proceedings of RFIDSec
, pp. 15-28
-
-
Monnerat, J.1
Vaudenay, S.2
Vuagnoux, M.3
-
23
-
-
0024983231
-
Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
-
Naor, M., Yung, M.: Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: Proceedings of STOC 1990, pp. 427-437 (1990)
-
(1990)
Proceedings of STOC 1990
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
24
-
-
25444432606
-
RFID Privacy Issues and Technical Challenges
-
Ohkubo, M., Suzuki, K., Kinoshita, S.: RFID Privacy Issues and Technical Challenges. Communications of the ACM 48(9), 66-71 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
25
-
-
41549161615
-
Privacy of Recent RFID Authentication Protocols
-
Proceedings of ISPEC, Springer, Heidelberg
-
Ouafi, K., Phan, R.C.-W.: Privacy of Recent RFID Authentication Protocols. In: Proceedings of ISPEC 2008. LNCS, vol. 4991, pp. 263-277. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4991
, pp. 263-277
-
-
Ouafi, K.1
Phan, R.C.-W.2
-
27
-
-
33746600612
-
-
Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange using Different Passwords. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 226-238. Springer, Heidelberg (2006)
-
Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange using Different Passwords. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 226-238. Springer, Heidelberg (2006)
-
-
-
-
28
-
-
37549042706
-
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
-
Barua, R, Lange, T, eds, INDOCRYPT 2006, Springer, Heidelberg
-
Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 104-117. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4329
, pp. 104-117
-
-
Phan, R.C.-W.1
Goi, B.-M.2
-
29
-
-
84974554584
-
Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 434-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 434-444
-
-
Rackoff, C.1
Simon, D.R.2
-
30
-
-
35048852068
-
-
Rogaway, P.: On the Role Definitions in and Beyond Cryptography. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, 3321, pp. 13-32. Springer, Heidelberg (2004)
-
Rogaway, P.: On the Role Definitions in and Beyond Cryptography. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 13-32. Springer, Heidelberg (2004)
-
-
-
-
31
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
33
-
-
33750290259
-
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
-
Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of PerCom 2006, pp. 640-643 (2006)
-
(2006)
Proceedings of PerCom
, pp. 640-643
-
-
Tsudik, G.1
-
34
-
-
34547414125
-
RFID Privacy based on Public-Key Cryptography
-
Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
-
Vaudenay, S.: RFID Privacy based on Public-Key Cryptography. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 1-6. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4296
, pp. 1-6
-
-
Vaudenay, S.1
-
35
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
|