-
1
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Advances in Cryptology, CRYPTO'05 , V. Shoup, Ed. Berlin, Germany: Springer-Verlag
-
A. Juels and S. Weis, "Authenticating pervasive devices with human protocols," in Advances in Cryptology - CRYPTO'05 (Lecture Notes in Computer Science), V. Shoup, Ed. Berlin, Germany: Springer-Verlag, 2005, vol. 3126, pp. 293-308.
-
(2005)
Lecture Notes in Computer Science
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
2
-
-
70349284581
-
Secure human identification protocols
-
C. Boyd, Ed. Berlin, Germany: Springer-Verlag
-
N. J. Hopper and M. Blum, "Secure human identification protocols," in Advances in Cryptology - ASIACRYPT 2001 (Lecture Notes in Computer Science), C. Boyd, Ed. Berlin, Germany: Springer-Verlag, 2001, vol. 2248, pp. 52-66.
-
(2001)
Advances in Cryptology - ASIACRYPT 2001 (Lecture Notes in Computer Science)
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
3
-
-
84877639283
-
Cryptographic primitives based on hard learning problems
-
Advances in Cryptology, CRYPTO'93 , Berlin, Germany: Springer-Verlag
-
A. Blum, M. L. Furst, M. J. Kearns, and R. J. Lipton, "Cryptographic primitives based on hard learning problems," in Advances in Cryptology - CRYPTO'93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1993, pp. 278-291.
-
(1993)
Lecture Notes in Computer Science
, pp. 278-291
-
-
Blum, A.1
Furst, M.L.2
Kearns, M.J.3
Lipton, R.J.4
-
4
-
-
0033702346
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Portland, ME, May
-
A. Blum, A. Kalai, and H. Wasserman, "Noise-tolerant learning, the parity problem, and the statistical query model," in Proc. Symp. Theory of Computing (STOC 2000), Portland, ME, May 2000, pp. 435-440.
-
(2000)
Proc. Symp. Theory of Computing (STOC 2000)
, pp. 435-440
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
5
-
-
84998808084
-
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication
-
R. Barua and T. Lange, Eds. Berlin, Germany: Springer-Verlag
-
M. P. C. Fossorier, M. J. Mihaljevic, H. Imai, Y. Cui, and K. Matsuura, "An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication," in INDOCRYPT 2006 (Lecture Notes in Computer Science), R. Barua and T. Lange, Eds. Berlin, Germany: Springer-Verlag, 2006, vol. 4329, pp. 48-62.
-
(2006)
INDOCRYPT 2006 (Lecture Notes in Computer Science)
, vol.4329
, pp. 48-62
-
-
Fossorier, M.P.C.1
Mihaljevic, M.J.2
Imai, H.3
Cui, Y.4
Matsuura, K.5
-
7
-
-
33749998666
-
An improved LPN algorithm
-
R. D. Prisco and M. Yung, Eds. Berlin, Germany: Springer-Verlag
-
E. Levieil and P.-A. Fouque, "An improved LPN algorithm," in SCN (lecture Notes in Computer Science), R. D. Prisco and M. Yung, Eds. Berlin, Germany: Springer-Verlag, 2006, vol. 4116, pp. 348-359.
-
(2006)
SCN (lecture Notes in Computer Science)
, vol.4116
, pp. 348-359
-
-
Levieil, E.1
Fouque, P.-A.2
-
8
-
-
27644472569
-
-
+ - A provably secure lightweight authentication protocol, IEE Electron. Lett., 4 1, no. 21, pp. 1169-1170, 2005.
-
+ - A provably secure lightweight authentication protocol," IEE Electron. Lett., vol. 4 1, no. 21, pp. 1169-1170, 2005.
-
-
-
-
9
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
IEEE Computer Society
-
++: A lightweight authentication protocol secure against some attacks," SecPerU, pp. 28-33, 2006, IEEE Computer Society.
-
(2006)
SecPerU
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
10
-
-
44449175875
-
Securing HB+ against GRS man-in-the-middle attack
-
Sasabo, Japan, Jan
-
D. Due and K. Kim, "Securing HB+ against GRS man-in-the-middle attack," in Proc. Symp. Cryptography and Information Security (SCIS2007), Sasabo, Japan, Jan. 2007, p. 123.
-
(2007)
Proc. Symp. Cryptography and Information Security (SCIS2007)
, pp. 123
-
-
Due, D.1
Kim, K.2
-
11
-
-
44449155290
-
-
+ in Proc. EUROCRYPT (Lecture Notes in Computer Science), N. P. Smart, Ed. Berlin, Germany: Springer-Verlag, 2008, 4965, pp. 361-378.
-
+" in Proc. EUROCRYPT (Lecture Notes in Computer Science), N. P. Smart, Ed. Berlin, Germany: Springer-Verlag, 2008, vol. 4965, pp. 361-378.
-
-
-
-
12
-
-
51349133676
-
PUF-HB: A tamper-resilient HB based authentication protocol
-
To Appear
-
G. Hammouri and B. Sunar, "PUF-HB: A tamper-resilient HB based authentication protocol," ACNS 2008, To Appear.
-
(2008)
ACNS
-
-
Hammouri, G.1
Sunar, B.2
-
13
-
-
34247523203
-
HB-MP: A further step in the HB-family of lightweight authentication protocols
-
J. Munilla and A. Peinado, "HB-MP: A further step in the HB-family of lightweight authentication protocols," Computer Networks, vol. 51, no. 9, pp. 2262-2267, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
14
-
-
34547638972
-
HB and related lightweight authentication protocols for secure RFID tag/reader authentication
-
Basel, Switzerland, Jun
-
S. Piramuthu, "HB and related lightweight authentication protocols for secure RFID tag/reader authentication," in Collaborative Electronic Commerce Technology and Research - CollECTeR 2006, Basel, Switzerland, Jun. 2006.
-
(2006)
Collaborative Electronic Commerce Technology and Research - CollECTeR 2006
-
-
Piramuthu, S.1
-
15
-
-
51349124869
-
Modified HB authentication protocol
-
Bochum, Germany, Jul
-
S. Piramuthu and Y.-J. Tu, "Modified HB authentication protocol," in Western European Workshop on Research in Cryptology, WEWoRC, Bochum, Germany, Jul. 2007.
-
(2007)
Western European Workshop on Research in Cryptology, WEWoRC
-
-
Piramuthu, S.1
Tu, Y.-J.2
-
16
-
-
33746104831
-
Parallel and concurrent security of the HB and HB+ protocols
-
S. Vaudenay, Ed. Berlin, Germany: Springer-Verlag
-
J. Katz and J. S. Shin, "Parallel and concurrent security of the HB and HB+ protocols," in Proc. EUROCRYPT (lecture Notes in Computer Science), S. Vaudenay, Ed. Berlin, Germany: Springer-Verlag, 2006, vol. 4004, pp. 73-87.
-
(2006)
Proc. EUROCRYPT (lecture Notes in Computer Science)
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Shin, J.S.2
-
18
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, no. 3, pp. 265-279, 1981.
-
(1981)
J. Comput. Syst. Sci
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, L.2
-
19
-
-
84991939136
-
LFSR-based hashing and authentication
-
CRYPTO , Y. Desmedt, Ed. Berlin, Germany: Springer-Verlag
-
H. Krawczyk, "LFSR-based hashing and authentication," in CRYPTO (Lecture Notes in Computer Science), Y. Desmedt, Ed. Berlin, Germany: Springer-Verlag, 1994, vol. 839, pp. 129-139.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
20
-
-
51349148049
-
A MITM Attack Against HB#
-
presented at the, Istanbul, Turkey, Apr
-
K. Ouafi, R. Overbeck, and S. Vaudenay, "A MITM Attack Against HB#," presented at the EUROCRYPT 2008 Rump Session, Istanbul, Turkey, Apr. 2008.
-
(2008)
EUROCRYPT 2008 Rump Session
-
-
Ouafi, K.1
Overbeck, R.2
Vaudenay, S.3
-
21
-
-
0003087344
-
Various techniques used in connection with random digits
-
J. von Neumann, "Various techniques used in connection with random digits," Appl. Math Ser., vol. 12, pp. 36-38, 1951.
-
(1951)
Appl. Math Ser
, vol.12
, pp. 36-38
-
-
von Neumann, J.1
|