메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Lightweight broadcast authentication protocols reconsidered

Author keywords

[No Author keywords available]

Indexed keywords

BROADCAST AUTHENTICATION; BROADCAST SYSTEMS; COMPUTATION COSTS; COMPUTATIONAL POWER; EMERGENCY ALERT SYSTEM; EMERGENCY SITUATION; ESTIMATION RESULTS; LOW COSTS; MCELIECE; RSA SIGNATURES; WARNING INFORMATIONS;

EID: 70349170503     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2009.4917781     Document Type: Conference Paper
Times cited : (11)

References (12)
  • 1
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA Broadcast Authentication Protocol
    • Summer/Fall
    • A. Perrig, R. Canetti, J.D. Tyger and D. Song, "The TESLA Broadcast Authentication Protocol," In CryptoBytes, Vol.5, No.2, Summer/Fall 2002, pp. 2-13.
    • (2002) In CryptoBytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canetti, R.2    Tyger, J.D.3    Song, D.4
  • 2
    • 84929461941 scopus 로고    scopus 로고
    • How to achieve a McEliecebased Digital Signature Scheme
    • N. Courtois, M. Finiasz and N. Sendrier, "How to achieve a McEliecebased Digital Signature Scheme," ASIACRYPT 2001, Vol. 2248 (2001), pp. 157-174.
    • (2001) ASIACRYPT , vol.2248 , pp. 157-174
    • Courtois, N.1    Finiasz, M.2    Sendrier, N.3
  • 4
    • 0002448405 scopus 로고
    • Public-Key Cryptosystem Based on Algebraic Coding Theory
    • R. J. McEliece, "Public-Key Cryptosystem Based on Algebraic Coding Theory," Deep Space Network Progress Rep., 1978.
    • (1978) Deep Space Network Progress Rep
    • McEliece, R.J.1
  • 5
    • 0015565580 scopus 로고
    • Enumerative source encoding
    • T. M. Cover, "Enumerative source encoding," IEEE Trans. on IT, vol. IT-19, pp. 73-77, 1973.
    • (1973) IEEE Trans. on IT , vol.IT-19 , pp. 73-77
    • Cover, T.M.1
  • 6
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • Proc. Coding Theory and Applications , Berlin, Germany: Springer-Verlag
    • J. Stern, "A method for finding codewords of small weight," in Proc. Coding Theory and Applications (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1989, vol. 388, pp. 106-113.
    • (1989) Lecture Notes in Computer Science , vol.388 , pp. 106-113
    • Stern, J.1
  • 7
    • 0347968064 scopus 로고
    • On the one-wayness against chosen-plaintext attacks on the Loidreau's modified McEliece PKC
    • K. Kobara and H. Imai, "On the one-wayness against chosen-plaintext attacks on the Loidreau's modified McEliece PKC," IEEE Trans. on IT, vol.49, no.12, pp. 3160-3168 (2003-12).
    • (1912) IEEE Trans. on IT , vol.49 , Issue.12 , pp. 3160-3168
    • Kobara, K.1    Imai, H.2
  • 8
    • 70349183494 scopus 로고    scopus 로고
    • Certification of Secure Encounter History Among Low Power Mobile Sensors
    • T. Sakai, A. Uchiyama, Y. Nakamura and T. Higashino, "Certification of Secure Encounter History Among Low Power Mobile Sensors," Proceedings of ICDF2008, pp.95-110, 2008.
    • (2008) Proceedings of ICDF2008 , pp. 95-110
    • Sakai, T.1    Uchiyama, A.2    Nakamura, Y.3    Higashino, T.4
  • 9
    • 0000653210 scopus 로고    scopus 로고
    • Selecting Cryptographic Key Sizes
    • A.K. Lenstra and E.R. Verheul, "Selecting Cryptographic Key Sizes," Journal of CRYPTOLOGY, vol. 14, no. 4, pp.255-293, 2001.
    • (2001) Journal of CRYPTOLOGY , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.K.1    Verheul, E.R.2
  • 12
    • 34547420699 scopus 로고    scopus 로고
    • How public key cryptography influences wireless sensor node lifetime
    • K. Piotrowski, P. Langendorfer and S. Peter, "How public key cryptography influences wireless sensor node lifetime," SASN 2006, pp.169-176.
    • (2006) SASN , pp. 169-176
    • Piotrowski, K.1    Langendorfer, P.2    Peter, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.