메뉴 건너뛰기




Volumn 54, Issue 9, 2008, Pages 4339-4342

Trusted-HB: A low-cost version of HB+ secure against man-in-the-middle attacks

Author keywords

Authentication; HB+ protocol; Low cost cryptography; Man in the middle (MITM) attacks; Radio frequency identification (RFID)

Indexed keywords

AUTHENTICATION; HB+ PROTOCOL; LOW-COST CRYPTOGRAPHY; MAN-IN-THE-MIDDLE (MITM) ATTACKS; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 51349120734     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2008.928290     Document Type: Article
Times cited : (49)

References (21)
  • 1
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Advances in Cryptology, CRYPTO'05 , V. Shoup, Ed. Berlin, Germany: Springer-Verlag
    • A. Juels and S. Weis, "Authenticating pervasive devices with human protocols," in Advances in Cryptology - CRYPTO'05 (Lecture Notes in Computer Science), V. Shoup, Ed. Berlin, Germany: Springer-Verlag, 2005, vol. 3126, pp. 293-308.
    • (2005) Lecture Notes in Computer Science , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 3
    • 84877639283 scopus 로고
    • Cryptographic primitives based on hard learning problems
    • Advances in Cryptology, CRYPTO'93 , Berlin, Germany: Springer-Verlag
    • A. Blum, M. L. Furst, M. J. Kearns, and R. J. Lipton, "Cryptographic primitives based on hard learning problems," in Advances in Cryptology - CRYPTO'93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1993, pp. 278-291.
    • (1993) Lecture Notes in Computer Science , pp. 278-291
    • Blum, A.1    Furst, M.L.2    Kearns, M.J.3    Lipton, R.J.4
  • 4
    • 0033702346 scopus 로고    scopus 로고
    • Noise-tolerant learning, the parity problem, and the statistical query model
    • Portland, ME, May
    • A. Blum, A. Kalai, and H. Wasserman, "Noise-tolerant learning, the parity problem, and the statistical query model," in Proc. Symp. Theory of Computing (STOC 2000), Portland, ME, May 2000, pp. 435-440.
    • (2000) Proc. Symp. Theory of Computing (STOC 2000) , pp. 435-440
    • Blum, A.1    Kalai, A.2    Wasserman, H.3
  • 5
    • 84998808084 scopus 로고    scopus 로고
    • An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
    • R. Barua and T. Lange, Eds. Berlin, Germany: Springer-Verlag
    • M. P. C. Fossorier, M. J. Mihaljevic, H. Imai, Y. Cui, and K. Matsuura, "An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication," in INDOCRYPT 2006 (Lecture Notes in Computer Science), R. Barua and T. Lange, Eds. Berlin, Germany: Springer-Verlag, 2006, vol. 4329, pp. 48-62.
    • (2006) INDOCRYPT 2006 (Lecture Notes in Computer Science) , vol.4329 , pp. 48-62
    • Fossorier, M.P.C.1    Mihaljevic, M.J.2    Imai, H.3    Cui, Y.4    Matsuura, K.5
  • 7
    • 33749998666 scopus 로고    scopus 로고
    • An improved LPN algorithm
    • R. D. Prisco and M. Yung, Eds. Berlin, Germany: Springer-Verlag
    • E. Levieil and P.-A. Fouque, "An improved LPN algorithm," in SCN (lecture Notes in Computer Science), R. D. Prisco and M. Yung, Eds. Berlin, Germany: Springer-Verlag, 2006, vol. 4116, pp. 348-359.
    • (2006) SCN (lecture Notes in Computer Science) , vol.4116 , pp. 348-359
    • Levieil, E.1    Fouque, P.-A.2
  • 8
    • 27644472569 scopus 로고    scopus 로고
    • + - A provably secure lightweight authentication protocol, IEE Electron. Lett., 4 1, no. 21, pp. 1169-1170, 2005.
    • + - A provably secure lightweight authentication protocol," IEE Electron. Lett., vol. 4 1, no. 21, pp. 1169-1170, 2005.
  • 9
    • 33845920117 scopus 로고    scopus 로고
    • ++: A lightweight authentication protocol secure against some attacks
    • IEEE Computer Society
    • ++: A lightweight authentication protocol secure against some attacks," SecPerU, pp. 28-33, 2006, IEEE Computer Society.
    • (2006) SecPerU , pp. 28-33
    • Bringer, J.1    Chabanne, H.2    Dottax, E.3
  • 11
    • 44449155290 scopus 로고    scopus 로고
    • + in Proc. EUROCRYPT (Lecture Notes in Computer Science), N. P. Smart, Ed. Berlin, Germany: Springer-Verlag, 2008, 4965, pp. 361-378.
    • +" in Proc. EUROCRYPT (Lecture Notes in Computer Science), N. P. Smart, Ed. Berlin, Germany: Springer-Verlag, 2008, vol. 4965, pp. 361-378.
  • 12
    • 51349133676 scopus 로고    scopus 로고
    • PUF-HB: A tamper-resilient HB based authentication protocol
    • To Appear
    • G. Hammouri and B. Sunar, "PUF-HB: A tamper-resilient HB based authentication protocol," ACNS 2008, To Appear.
    • (2008) ACNS
    • Hammouri, G.1    Sunar, B.2
  • 13
    • 34247523203 scopus 로고    scopus 로고
    • HB-MP: A further step in the HB-family of lightweight authentication protocols
    • J. Munilla and A. Peinado, "HB-MP: A further step in the HB-family of lightweight authentication protocols," Computer Networks, vol. 51, no. 9, pp. 2262-2267, 2007.
    • (2007) Computer Networks , vol.51 , Issue.9 , pp. 2262-2267
    • Munilla, J.1    Peinado, A.2
  • 14
    • 34547638972 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • Basel, Switzerland, Jun
    • S. Piramuthu, "HB and related lightweight authentication protocols for secure RFID tag/reader authentication," in Collaborative Electronic Commerce Technology and Research - CollECTeR 2006, Basel, Switzerland, Jun. 2006.
    • (2006) Collaborative Electronic Commerce Technology and Research - CollECTeR 2006
    • Piramuthu, S.1
  • 16
    • 33746104831 scopus 로고    scopus 로고
    • Parallel and concurrent security of the HB and HB+ protocols
    • S. Vaudenay, Ed. Berlin, Germany: Springer-Verlag
    • J. Katz and J. S. Shin, "Parallel and concurrent security of the HB and HB+ protocols," in Proc. EUROCRYPT (lecture Notes in Computer Science), S. Vaudenay, Ed. Berlin, Germany: Springer-Verlag, 2006, vol. 4004, pp. 73-87.
    • (2006) Proc. EUROCRYPT (lecture Notes in Computer Science) , vol.4004 , pp. 73-87
    • Katz, J.1    Shin, J.S.2
  • 18
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, no. 3, pp. 265-279, 1981.
    • (1981) J. Comput. Syst. Sci , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2
  • 19
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • CRYPTO , Y. Desmedt, Ed. Berlin, Germany: Springer-Verlag
    • H. Krawczyk, "LFSR-based hashing and authentication," in CRYPTO (Lecture Notes in Computer Science), Y. Desmedt, Ed. Berlin, Germany: Springer-Verlag, 1994, vol. 839, pp. 129-139.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 21
    • 0003087344 scopus 로고
    • Various techniques used in connection with random digits
    • J. von Neumann, "Various techniques used in connection with random digits," Appl. Math Ser., vol. 12, pp. 36-38, 1951.
    • (1951) Appl. Math Ser , vol.12 , pp. 36-38
    • von Neumann, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.