-
1
-
-
58049161510
-
Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags
-
M. Barasz, B. Boros, P. Ligeti, K. Lacuteoja, and D. Nagyl. Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags. In EURASIP Workshop on RFID Technology, 2007.
-
EURASIP Workshop on RFID Technology, 2007
-
-
Barasz, M.1
Boros, B.2
Ligeti, P.3
Lacuteoja, K.4
Nagyl, D.5
-
2
-
-
70350633827
-
Reducing Key Length of the McEliece Cryptosystem
-
Advances in Cryptology (AFRICACRYPT'09), Springer-Verlag
-
Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani. Reducing Key Length of the McEliece Cryptosystem. In Advances in Cryptology (AFRICACRYPT'09), volume 5580 of LNCS, pages 77-97. Springer-Verlag, 2009.
-
(2009)
LNCS
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
3
-
-
56749164782
-
Attacking and Defending the McEliece Cryptosystem
-
Springer-Verlag
-
Daniel J. Bernstein, Tanja Lange, and Christiane Peters. Attacking and Defending the McEliece Cryptosystem. In 2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08), volume 5299, pages 31-46. Springer-Verlag, 2008.
-
(2008)
2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08)
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
4
-
-
56749156338
-
McEliece cryptosystem implementation: Theory and practice
-
Second International Workshop in Post-Quantum Cryptography: PQCrypto'08
-
Bhaskar Biswas and Nicolas Sendrier. McEliece cryptosystem implementation: theory and practice. In Second International Workshop in Post-Quantum Cryptography: PQCrypto'08, volume 5299 of LNCS, pages 47-62, 2008.
-
(2008)
LNCS
, vol.5299
, pp. 47-62
-
-
Biswas, B.1
Sendrier, N.2
-
5
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), IACR, Springer-Verlag
-
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), volume 3156 of Lecture Notes in Computer Science, pages 357-370. IACR, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
7
-
-
44449155290
-
HB#: Increasing the security and efficiency of HB+
-
Advances in Cryptology (Eurocrypt'08), Springer
-
Henri Gilbert, Matthew J.B. Robshaw, and Yannick Seurin. HB#: increasing the security and efficiency of HB+. In Advances in Cryptology (Eurocrypt'08), volume 4965 of LNCS, pages 361-378. Springer, 2008.
-
(2008)
LNCS
, vol.4965
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
8
-
-
27644472569
-
An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol
-
Henri Gilbert, Matthew J.B. Robshaw, and Herv Sibert. An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol. IEE Electronics Letters, 41(21):1169-1170, 2005.
-
(2005)
IEE Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Sibert, H.3
-
9
-
-
33749561582
-
On the fly authentication and signature schemes based on groups of unknown order
-
M. Girault, G. Poupard, and J. Stern. On the fly authentication and signature schemes based on groups of unknown order. Journal of Cryptology, 19:463-487, 2006.
-
(2006)
Journal of Cryptology
, vol.19
, pp. 463-487
-
-
Girault, M.1
Poupard, G.2
Stern, J.3
-
10
-
-
78751640721
-
NTRUSign: Digital signatures using the NTRU lattice
-
J. Hoffstein, N. Howgrave-Graham, J. Pipher, J. H. Silverman, and W. Whyte. NTRUSign: Digital signatures using the NTRU lattice. In RSA conference, 2003.
-
RSA Conference, 2003
-
-
Hoffstein, J.1
Howgrave-Graham, N.2
Pipher, J.3
Silverman, J.H.4
Whyte, W.5
-
11
-
-
78751617729
-
-
Technical Report 12, NTRU Cryptosystems, Inc., June
-
Jeffrey Hoffstein, Joseph H. Silverman, and William Whyte. NTRU report 012. Estimated breaking times for NTRU lattices. Technical Report 12, NTRU Cryptosystems, Inc., June 2003.
-
(2003)
NTRU Report 012. Estimated Breaking Times for NTRU Lattices
-
-
Hoffstein, J.1
Silverman, J.H.2
Whyte, W.3
-
12
-
-
30344469114
-
Authenticating pervasive devices with human protocols
-
Advances in Cryptology (Crypto'05), Springer
-
Ari Juels and Stephen A. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology (Crypto'05), volume 3126 of LNCS, pages 198-293. Springer, 2005.
-
(2005)
LNCS
, vol.3126
, pp. 198-293
-
-
Juels, A.1
Weis, S.A.2
-
15
-
-
34548162681
-
Vulnerability analysis of EMAP - An efficient RFID mutual authentication protocol
-
T. Li and R. Deng. Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol. In AReS'07, 2007.
-
(2007)
AReS'07
-
-
Li, T.1
Deng, R.2
-
16
-
-
36248977046
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
T. Li and G. Wang. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP-SEC'07, 2007.
-
(2007)
IFIP-SEC'07
-
-
Li, T.1
Wang, G.2
-
18
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
ACM, ACM Press
-
David Molnar and David Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In Conference on Computer and Communications Security (CCS'04), pages 210-219. ACM, ACM Press, 2004.
-
(2004)
Conference on Computer and Communications Security (CCS'04)
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
19
-
-
0022582790
-
Knapsack-type cryptosystems and algebraic coding theory
-
Harald Niederreiter. Knapsack-type cryptosystems and algebraic coding theory. Problems in Control and Information Theory, 15:159-166, 1986.
-
(1986)
Problems in Control and Information Theory
, vol.15
, pp. 159-166
-
-
Niederreiter, H.1
-
20
-
-
0001859260
-
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
-
Advances in Cryptology (CRYPTO'92), Springer
-
T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Advances in Cryptology (CRYPTO'92), volume 740 of Lecture Notes in Computer Science, page 3153. Springer, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 3153
-
-
Okamoto, T.1
-
21
-
-
33845455482
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
IS'06, Springer-Verlag
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In IS'06, volume 4277 of LNCS, pages 352-361. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
23
-
-
33750067948
-
M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
UIC'06, Springer-Verlag
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In UIC'06, volume 4159 of LNCS, pages 912-923. Springer-Verlag, 2006.
-
(2006)
LNCS
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
24
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
Jacques Stern. A new identification scheme based on syndrome decoding. In Advances in Cryptology: CRYPTO'93, pages 13-21, 1993.
-
(1993)
Advances in Cryptology: CRYPTO'93
, pp. 13-21
-
-
Stern, J.1
-
25
-
-
0030672385
-
Algorithmic complexity in coding theory and the minimum distance problem
-
Alexander Vardy. Algorithmic complexity in coding theory and the minimum distance problem. In twenty-ninth annual ACM symposium on Theory of Computing, volume 92-109, 1997.
-
(1997)
Twenty-ninth Annual ACM Symposium on Theory of Computing
, vol.92-109
-
-
Vardy, A.1
|