-
1
-
-
0030287972
-
Security of private-key encryption based on array codes
-
Al Jabri A. Security of private-key encryption based on array codes. Electronics Letters 32 24 (1996) 2226-2227
-
(1996)
Electronics Letters
, vol.32
, Issue.24
, pp. 2226-2227
-
-
Al Jabri, A.1
-
4
-
-
33747058795
-
Security implications in RFID and authentication processing framework
-
Ayoade J. Security implications in RFID and authentication processing framework. Computers & Security 25 (2006) 207-212
-
(2006)
Computers & Security
, vol.25
, pp. 207-212
-
-
Ayoade, J.1
-
5
-
-
84957629783
-
Relations among notations of security for public key Encryption schemes
-
Proceedings of CRYPTO'98, Springer-Verlag
-
Bellare M., Desai A., Pointcheval D., and Rogaway P. Relations among notations of security for public key Encryption schemes. Proceedings of CRYPTO'98. LNCS vol. 1462 (1998), Springer-Verlag 26-45
-
(1998)
LNCS
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
6
-
-
68849109681
-
Attacking and defending the mceliece cryptosystem, cryptology ePrint Archive
-
Report 2008/318
-
D.J. Bernstein, T. Lange, C. Peters, Attacking and defending the mceliece cryptosystem, cryptology ePrint Archive: Report 2008/318
-
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
7
-
-
84958666890
-
Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
-
Springer, Berlin
-
Berson T.A. Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. Advances in Cryptology - CRYPTO 97 (1997), Springer, Berlin 213-220
-
(1997)
Advances in Cryptology - CRYPTO 97
, pp. 213-220
-
-
Berson, T.A.1
-
8
-
-
33845920117
-
HB++: A lightweight authentication protocol secure against some attacks
-
J. Bringer, H. Chabanne, E. Dottax, HB++: A lightweight authentication protocol secure against some attacks, in: IEEE International Conference on Pervasive Service, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006
-
(2006)
IEEE International Conference on Pervasive Service, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
10
-
-
68849112148
-
Secure access control schemes for RFID systems with anonymity
-
May 9, Japan
-
H.Y. Chien, Secure access control schemes for RFID systems with anonymity, in: Proceedings of FMUIT'06, May 9, Japan, 2006
-
(2006)
Proceedings of FMUIT'06
-
-
Chien, H.Y.1
-
12
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
-
Chien H.Y., and Chen C.H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computers Standards and Interfaces 29/2 Feb. (2007) 254-259
-
(2007)
Computers Standards and Interfaces
, vol.29-2
, Issue.Feb
, pp. 254-259
-
-
Chien, H.Y.1
Chen, C.H.2
-
13
-
-
33744462119
-
A remote authentication scheme preserving user anonymity
-
March, INA, ISBN 0-7695-2249-1
-
H.-Y. Chien, C.-H. Chen, A remote authentication scheme preserving user anonymity, in: The IEEE First International Workshop on Information Networking and Applications, March, INA'2005, ISBN 0-7695-2249-1, 2005, pp. 245-248.
-
(2005)
The IEEE First International Workshop on Information Networking and Applications
, pp. 245-248
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
14
-
-
68849109435
-
Cryptanalysis on LMAP, M2AP and Li-Wang's scheme
-
ChiaYi, Taiwan
-
H.Y. Chien, Hwang, Cryptanalysis on LMAP, M2AP and Li-Wang's scheme, Information Security Conference 2007, ChiaYi, Taiwan, 2007
-
(2007)
Information Security Conference
-
-
Chien, H.Y.1
Hwang2
-
16
-
-
33751513718
-
Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
-
D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, in: The 2006 Symposium on Cryptography and Information Security, 2006
-
(2006)
The 2006 Symposium on Cryptography and Information Security
-
-
Duc, D.N.1
Park, J.2
Lee, H.3
Kim, K.4
-
17
-
-
80054802288
-
A summary of McEliece-type cryptosystems and their security, Cryptology ePrint Archive
-
Report 2006/162, URL
-
D. Engelbert, R. Overbeck, A. Schmidt, A summary of McEliece-type cryptosystems and their security, Cryptology ePrint Archive: Report 2006/162, 2006. URL http://eprint.iacr.org/2006/162
-
(2006)
-
-
Engelbert, D.1
Overbeck, R.2
Schmidt, A.3
-
18
-
-
84891359925
-
-
EPCglobal.http://www.epcglobalinc.org/
-
EPCglobal
-
-
-
19
-
-
33144487342
-
An active attack against HB+-A provably secure lightweight authentication protocol, Cryptology ePrint Archive
-
Report 2005/237
-
H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+-A provably secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005/237, 2005
-
(2005)
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
20
-
-
2942625823
-
-
A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: In the Proceedings of PerSec'04 at IEEE PerCom, 2004, pp.149-153
-
A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: In the Proceedings of PerSec'04 at IEEE PerCom, 2004, pp.149-153
-
-
-
-
21
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - ASIACRYPT 2001, Springer
-
Hopper N.J., and Blum M. Secure human identification protocols. Advances in Cryptology - ASIACRYPT 2001. LNCS vol. 2248 (2001), Springer 52-66
-
(2001)
LNCS
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
22
-
-
68849086667
-
Strengthening EPC tag against cloning
-
A. Juels, Strengthening EPC tag against cloning, in: The Proceedings of WiSe'05, 2005
-
(2005)
The Proceedings of WiSe'05
-
-
Juels, A.1
-
23
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Advances in Cryptology - Crypto'05, Springer
-
Juels A., and Weis S.A. Authenticating pervasive devices with human protocols. Advances in Cryptology - Crypto'05. LNCS vol. 3126 (2005), Springer 293-308
-
(2005)
LNCS
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
25
-
-
84937393537
-
Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC
-
PKC, Springer
-
Kobara K., and Imai H. Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. PKC. LNCS vol. 1992 (2001), Springer 19-35
-
(2001)
LNCS
, vol.1992
, pp. 19-35
-
-
Kobara, K.1
Imai, H.2
-
26
-
-
34548815120
-
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
-
Austria, July
-
S.S. Kumar, C. Paar, Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?, in: Proceedings of Workshop on RFID Security, Austria, July 2006
-
(2006)
Proceedings of Workshop on RFID Security
-
-
Kumar, S.S.1
Paar, C.2
-
27
-
-
34548162681
-
Vulnerability analysis of EMAP-An efficient RFID mutual authentication protocol
-
Vienna
-
T. Li, R.H. Deng, Vulnerability analysis of EMAP-An efficient RFID mutual authentication protocol, in: The Second International Conference on Availability, Reliability and Security, AReS 2007, 2007, Vienna
-
(2007)
The Second International Conference on Availability, Reliability and Security, AReS
-
-
Li, T.1
Deng, R.H.2
-
28
-
-
38149008857
-
Cryptanalysis of EPC class 1 generation 2 RFID authentication
-
ChiaYi, Taiwan
-
C.-L. Lin, K.C. Chang, Cryptanalysis of EPC class 1 generation 2 RFID authentication, Information Security Conference 2007, ChiaYi, Taiwan, 2007
-
(2007)
Information Security Conference
-
-
Lin, C.-L.1
Chang, K.C.2
-
31
-
-
68849131737
-
-
A public-key cryptosystem based on algebraic coding theory, 42-44. URL
-
R.J. McEliece, A public-key cryptosystem based on algebraic coding theory, 1978, Jet Propulsion Laboratory DSN Progress Report 42-44. URL http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
-
(1978)
Jet Propulsion Laboratory DSN Progress Report
-
-
McEliece, R.J.1
-
32
-
-
14844294769
-
Issues, practices, and architectures
-
Privacy and security in library RFID
-
D. Molnar, D. Wagner, Privacy and security in library RFID: Issues, practices, and architectures, in: Conference on Computer and Communications Security, CCS'04, 2004, pp. 210-219
-
(2004)
Conference on Computer and Communications Security, CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
34
-
-
0346895307
-
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
-
Park C.S. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Computer Networks 44 2 (2004) 267-273
-
(2004)
Computer Networks
, vol.44
, Issue.2
, pp. 267-273
-
-
Park, C.S.1
-
35
-
-
36248971663
-
A real lightweight mutual authentication protocol for low-cost RFID tags
-
LMAP:, July
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, in: Proc. of 2nd Workshop on RFID Security, July 2006
-
(2006)
Proc. of 2nd Workshop on RFID Security
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
36
-
-
33750067948
-
M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Proc. of International Conference on Ubiquitous Intelligence and Computing. UIC'06, Springer
-
Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., and Ribagorda A. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. Proc. of International Conference on Ubiquitous Intelligence and Computing. UIC'06. LNCS vol. 4159 (2006), Springer 912-923
-
(2006)
LNCS
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
37
-
-
34548165793
-
An efficient mutual authentication protocol for low-cost RFID tags
-
EMAP:, November
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Ribagorda, EMAP: An efficient mutual authentication protocol for low-cost RFID tags, in: OTM Federated Conferences and Workshop: IS Workshop, November 2006
-
(2006)
OTM Federated Conferences and Workshop: IS Workshop
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
39
-
-
36249031858
-
HB and related lightweight authentication protocols for secure RFID tag/reader authentication
-
June
-
S. Piramuthu, HB and related lightweight authentication protocols for secure RFID tag/reader authentication, CollECTeR Europe Conference, June 2006
-
(2006)
CollECTeR Europe Conference
-
-
Piramuthu, S.1
-
40
-
-
85024311289
-
Private-key algebraic-coded cryptosystems
-
Springer, Berlin
-
Rao T.R.N., and Nam K.H. Private-key algebraic-coded cryptosystems. Advances in Cryptology-CRYPTO 86 (1987), Springer, Berlin 35-48
-
(1987)
Advances in Cryptology-CRYPTO 86
, pp. 35-48
-
-
Rao, T.R.N.1
Nam, K.H.2
-
41
-
-
24644501824
-
-
K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing, SPC 2005, 2005, pp. 70-84
-
K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing, SPC 2005, 2005, pp. 70-84
-
-
-
-
42
-
-
32444435813
-
Radio frequency identification
-
Robert C.M. Radio frequency identification. Computers and Security 25 (2006) 18-26
-
(2006)
Computers and Security
, vol.25
, pp. 18-26
-
-
Robert, C.M.1
-
44
-
-
84956862729
-
The Rao-Nam scheme is insecure against a chosen-plaintext attack
-
Springer, Berlin
-
Struik R., and Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology - CRYPTO 87 (1988), Springer, Berlin 445-457
-
(1988)
Advances in Cryptology - CRYPTO 87
, pp. 445-457
-
-
Struik, R.1
Tilburg, J.2
-
47
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
In the Proceedings of the First Security in Pervasive Computing
-
Weis S.A., Sarma S.E., Rivest R.L., and Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems. In the Proceedings of the First Security in Pervasive Computing. LNCS vol. 2802 (2003) 201-212
-
(2003)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
48
-
-
33751520626
-
Mutual authentication protocol for low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, 2005
-
(2005)
Handout of the Ecrypt Workshop on RFID and Lightweight Crypto
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|