-
1
-
-
34247523203
-
A Further Step in the HB-family of Lightweight authentication protocols
-
J.Munilla, A.Peinado. HP-MP: A Further Step in the HB-family of Lightweight authentication protocols. Computer Networks, 51(2007), pp.2262-2267
-
(2007)
Computer Networks
, vol.51
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
MP, H.3
-
3
-
-
70349284581
-
-
N.J.Hopper and M.Blum. Secure Human Identification Protocols. Advanced in Cryptology-ASIACRYPT'2001, Lecture Notes in Computer Science,2248 Sprmger,2001,pp.52-66.
-
N.J.Hopper and M.Blum. Secure Human Identification Protocols. Advanced in Cryptology-ASIACRYPT'2001, Lecture Notes in Computer Science,Vol. 2248 Sprmger,2001,pp.52-66.
-
-
-
-
4
-
-
33745181952
-
-
A. Juels, S.Weis, Authenticating Pervasive Devices with Human Protocols, Advances in. Cryptology-Crypto2005, Lecture Notes in Computer Science,3621, Springer, 2005, pp.293-308.
-
A. Juels, S.Weis, Authenticating Pervasive Devices with Human Protocols, Advances in. Cryptology-Crypto2005, Lecture Notes in Computer Science,Vol.3621, Springer, 2005, pp.293-308.
-
-
-
-
5
-
-
33144487342
-
H.Silbert, an Active Attack against HB+-a Provable Secure Lightweighted Authentication Protocol. Cryptology ePrint Archive
-
Report 2005/237
-
H.Gilbert, M.Robshaw, H.Silbert, an Active Attack against HB+-a Provable Secure Lightweighted Authentication Protocol. Cryptology ePrint Archive, Report 2005/237, 2005, http://epri.nt.iacr.org.
-
(2005)
-
-
Gilbert, H.1
Robshaw, M.2
-
6
-
-
49049092761
-
-
H.Gilbert, M.Robshaw and Yannick Seurin, HB#: Increasing the Security and Efficiency of HB+, 2008, To be published on EUROCRYPT 2008, Available from, http://eprint.iacr.org.
-
H.Gilbert, M.Robshaw and Yannick Seurin, HB#: Increasing the Security and Efficiency of HB+, 2008, To be published on EUROCRYPT 2008, Available from, http://eprint.iacr.org.
-
-
-
-
7
-
-
36249031858
-
HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication
-
Basel, Switzerland, 9-10 June
-
S.Piramuthu, HB and Related Lightweight Authentication Protocols for Secure RFID Tag/Reader Authentication, CoIlECTeR Europe Conference, Basel, Switzerland, 9-10 June, 2006.
-
(2006)
CoIlECTeR Europe Conference
-
-
Piramuthu, S.1
-
9
-
-
49049111541
-
-
+ Protocols, Cryptology ePrint Archive, Report 2005/461, 2005, http://eprint.iacr.org.
-
+ Protocols, Cryptology ePrint Archive, Report 2005/461, 2005, http://eprint.iacr.org.
-
-
-
-
10
-
-
49049102480
-
-
+ Protocols in the Large Error Case. Available from http://epr.int.iacr.org/2006/ 326.pdf.
-
+ Protocols in the "Large Error" Case. Available from http://epr.int.iacr.org/2006/ 326.pdf.
-
-
-
-
13
-
-
49049120282
-
-
H. Krawczyk. LFSR-based hashing and authentication. In Yvo Desmedt, editor, CRYPTO, 839 of Lecture Notes in Computer Science, pages 129C139. Springer, 1994.
-
H. Krawczyk. LFSR-based hashing and authentication. In Yvo Desmedt, editor, CRYPTO, volume 839 of Lecture Notes in Computer Science, pages 129C139. Springer, 1994.
-
-
-
-
14
-
-
84957367286
-
New Hash Functions for Message Authentication
-
Proceedings of Eurocrypt, Springer
-
H. Krawczyk. New Hash Functions for Message Authentication. In Proceedings of Eurocrypt 1995, LNCS 950, pp. 301C310, Springer, 1995.
-
(1995)
LNCS
, vol.950
, Issue.C310
, pp. 301
-
-
Krawczyk, H.1
|