-
3
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
V. Shoup, editor, Advances in Cryptology, Proceedings of CRYPTO, of, Springer Verlag
-
A. Juels and S. A.Weis. Authenticating pervasive devices with human protocols. In V. Shoup, editor, Advances in Cryptology, Proceedings of CRYPTO 2005, volume 3621 of LNCS, pages 293-308. Springer Verlag, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
4
-
-
84957018842
-
Low Cost Attacks on Tamper Resistant Devices
-
B. Christianson, B. Crispo, T.M.A. Lomas and M. Roe, editors, Proceedings of the 5th International Workshop on Security Protocols, of, Springer Verlag
-
R. Anderson and M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. In B. Christianson, B. Crispo, T.M.A. Lomas and M. Roe, editors, Proceedings of the 5th International Workshop on Security Protocols, volume 1361 of LNCS , pages 125-136. Springer Verlag, 1997.
-
(1997)
LNCS
, vol.1361
, pp. 125-136
-
-
Anderson, R.1
Kuhn, M.2
-
5
-
-
84948152556
-
Memories: A Survey of their Secure Uses in Smart Cards
-
Washington DC, USA
-
M. Neve, E. Peeters, D. Samyde and J. Quisquater. Memories: a Survey of their Secure Uses in Smart Cards. The 2nd International IEEE Security In Storage Workshop (IEEE SISW'03), pages 62-72, Washington DC, USA, 2003.
-
(2003)
The 2nd International IEEE Security In Storage Workshop (IEEE SISW'03)
, pp. 62-72
-
-
Neve, M.1
Peeters, E.2
Samyde, D.3
Quisquater, J.4
-
7
-
-
14244253910
-
An Approach to Security and Privacy of RFID System for Supply Chain
-
X. Gao, Z. Xiang, H. Wang, J. Shen, J. Huang and S. Song. An Approach to Security and Privacy of RFID System for Supply Chain. Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), 2004.
-
(2004)
Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04)
-
-
Gao, X.1
Xiang, Z.2
Wang, H.3
Shen, J.4
Huang, J.5
Song, S.6
-
9
-
-
49049113848
-
-
M. Ohkubo, K. Suzuki and S. Kinoshita. Cryptographic Approach to Privacy-Friendly Tags. RFID Privacy Workshop @ MIT, 2003.
-
M. Ohkubo, K. Suzuki and S. Kinoshita. Cryptographic Approach to "Privacy-Friendly" Tags. RFID Privacy Workshop @ MIT, 2003.
-
-
-
-
11
-
-
35048859848
-
Strong Authentication for RFID Systems using the AES Algorithm
-
M. Joye and J. J. Quisquater, editors, Cryptographic Hardware and Embedded Systems CHES, of, Springer Verlag
-
M. Feldhofer, S. Dominikus and J. Wolkerstorfer. Strong Authentication for RFID Systems using the AES Algorithm.. In M. Joye and J. J. Quisquater, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 3156 of LNCS, pages 357-370. Springer Verlag, 2004.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
16
-
-
34548353243
-
Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags'?
-
Graz, Austria, August
-
J. Wolkerstorfer. Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags'? Workshop on RFID and Light-weight Cryptography, Graz, Austria, August 2005.
-
(2005)
Workshop on RFID and Light-weight Cryptography
-
-
Wolkerstorfer, J.1
-
17
-
-
33745654539
-
-
P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, 3860 of LNCS, pages 115-131. Springer Verlag, February 13-17 2006.
-
P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, volume 3860 of LNCS, pages 115-131. Springer Verlag, February 13-17 2006.
-
-
-
-
18
-
-
34547688845
-
Public-Key Cryp-tography for RFID-Tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. Public-Key Cryp-tography for RFID-Tags. In Proceedings of IEEE International. Workshop on Pervasive Com-puting and Communication Security , 6 pages, 2007.
-
Proceedings of IEEE International. Workshop on Pervasive Com-puting and Communication Security
, vol.6
, pp. 2007
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
19
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
Gilles Brassard, editor, Advances in Cryptology, CRYPTO '89, of, Springer Verlag
-
C.-P. Schnorr. Efficient Identification and Signatures for Smart Cards. In Gilles Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of LNCS, pages 239-252. Springer Verlag, 1989.
-
(1989)
LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
20
-
-
84875762817
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
E. F. Brickell, editor, Advances in Cryptology, CRYPTO'92, of, Springer Verlag
-
T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO'92, volume 740 of LNCS, pages 31-53. Springer Verlag, 1992.
-
(1992)
LNCS
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
21
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
W. Fumy, editor, Eurocrypt '97, of, Springer
-
V. Shoup. Lower bounds for discrete logarithms and related problems. In W. Fumy, editor, Eurocrypt '97, volume 1233 of LNCS, pages 256-266. Springer, 1997.
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
22
-
-
33646832943
-
Abstract models of computation in cryptography
-
10th IMA Conference On Cryptography and Coding, Springer-Verlag
-
U. Maurer. Abstract models of computation in cryptography. In 10th IMA Conference On Cryptography and Coding, volume 2796of LNCS, pages 1-12. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.2796 of
, pp. 1-12
-
-
Maurer, U.1
-
23
-
-
57049170893
-
The hardness of the DHK problem in the generic group model. Cryptology ePrint Archive
-
Report 2006/156
-
A. W. Dent. The hardness of the DHK problem in the generic group model. Cryptology ePrint Archive, Report 2006/156.
-
-
-
Dent, A.W.1
-
24
-
-
49049092762
-
-
ANSI X9.42-2003 Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, American National Standards Insti-tute, 2003.
-
ANSI X9.42-2003 Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, American National Standards Insti-tute, 2003.
-
-
-
|