메뉴 건너뛰기




Volumn , Issue , 2011, Pages 26-33

On hardware-oriented message authentication with applications towards RFID

Author keywords

Message Authentication Codes; RFID; Universal Hash Functions

Indexed keywords

LIGHT-WEIGHT CONSTRUCTIONS; MESSAGE AUTHENTICATION; MESSAGE AUTHENTICATION CODES; RFID; SAMPLE SPACE; THEORETICAL RESULT; TOEPLITZ MATRICES; UNIVERSAL HASH FUNCTION; UNIVERSAL HASH FUNCTIONS;

EID: 79955919703     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LightSec.2011.9     Document Type: Conference Paper
Times cited : (11)

References (23)
  • 3
    • 77954695258 scopus 로고    scopus 로고
    • Lightweight privacy preserving authentication for RFID using a stream cipher
    • S. Hong and T. Iwata, editors, Fast Software Encryption 2010, Springer-Verlag
    • O. Billet, J. Etrog, and H. Gilbert. Lightweight privacy preserving authentication for RFID using a stream cipher. In S. Hong and T. Iwata, editors, Fast Software Encryption 2010, volume 6147 of Lecture Notes in Computer Science, pages 55-78. Springer-Verlag, 2010.
    • (2010) Lecture Notes in Computer Science , vol.6147 , pp. 55-78
    • Billet, O.1    Etrog, J.2    Gilbert, H.3
  • 5
    • 48249107069 scopus 로고    scopus 로고
    • Trivium
    • M. Robshaw and O. Billet, editors, New Stream Cipher Designs, Springer-Verlag
    • C. De Cannière and B. Preneel. Trivium. In M. Robshaw and O. Billet, editors, New Stream Cipher Designs, volume 4986 of Lecture Notes in Computer Science, pages 244-266. Springer-Verlag, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4986 , pp. 244-266
    • De Cannière, C.1    Preneel, B.2
  • 6
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for finding minimum-weight words in a linear code: Application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
    • PII S0018944898000182
    • A. Canteaut and F. Chabaud. A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory, 44:367-378, 1998. (Pubitemid 128737912)
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 8
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • October
    • J. D. Golić. Computation of low-weight parity-check polynomials. Electronic Letters, 32(21):1981-1982, October 1996.
    • (1996) Electronic Letters , vol.32 , Issue.21 , pp. 1981-1982
    • Golić, J.D.1
  • 9
    • 51849140875 scopus 로고    scopus 로고
    • Key-recovery attacks on universal hash function based MAC algorithms
    • D. Wagner, editor, Advances in Cryptology - CRYPTO 2008, Springer-Verlag
    • H. Handschuh and B. Preneel. Key-recovery attacks on universal hash function based MAC algorithms. In D. Wagner, editor, Advances in Cryptology - CRYPTO 2008, volume 5157 of Lecture Notes in Computer Science, pages 144-161. Springer-Verlag, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5157 , pp. 144-161
    • Handschuh, H.1    Preneel, B.2
  • 12
    • 84878363139 scopus 로고
    • On the relation between A-codes and codes correcting independent errors
    • T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93 Springer-Verlag
    • T. Johansson, G. Kabatianskii, and B. Smeets. On the relation between A-codes and codes correcting independent errors. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science, pages 1-11. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 1-11
    • Johansson, T.1    Kabatianskii, G.2    Smeets, B.3
  • 13
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Springer-Verlag
    • H. Krawczyk. LFSR-based hashing and authentication. In Advances in Cryptology - CRYPTO'94, pages 129-139. Springer-Verlag, 1994.
    • (1994) Advances in Cryptology - CRYPTO'94 , pp. 129-139
    • Krawczyk, H.1
  • 14
    • 84957367286 scopus 로고
    • New hash functions for message authentication
    • Springer-Verlag
    • H. Krawczyk. New hash functions for message authentication. In Advances in Cryptology - EUROCRYPT'95, pages 301-310. Springer-Verlag, 1995.
    • (1995) Advances in Cryptology - EUROCRYPT'95 , pp. 301-310
    • Krawczyk, H.1
  • 15
    • 0027869083 scopus 로고
    • Learning decision trees using the fourier spectrum
    • E. Kushilevitz and Y. Mansour. Learning decision trees using the fourier spectrum. SIAM Journal on Computing, 22(6):1331-1348, 1993.
    • (1993) SIAM Journal on Computing , vol.22 , Issue.6 , pp. 1331-1348
    • Kushilevitz, E.1    Mansour, Y.2
  • 16
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93, Springer-Verlag
    • M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science, pages 386-397. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.765 , pp. 386-397
    • Matsui, M.1
  • 17
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1(3):159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 18
    • 0027641832 scopus 로고
    • Small-bias probability spaces: Efficient constructions and applications
    • J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM Journal on Computing, 22(4):838-856, 1993. (Pubitemid 23677151)
    • (1993) SIAM Journal on Computing , vol.22 , Issue.4 , pp. 838-856
    • Naor, J.1    Naor, M.2
  • 19
    • 84947926195 scopus 로고
    • Computation of low-weight parity checks for correlation attacks on stream ciphers
    • C. Boyd, editor, Cryptography and Coding - 5th IMA Conference, Springer-Verlag
    • W.T. Penzhorn and G.J. Kühn. Computation of low-weight parity checks for correlation attacks on stream ciphers. In C. Boyd, editor, Cryptography and Coding - 5th IMA Conference, volume 1025 of Lecture Notes in Computer Science, pages 74-83. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1025 , pp. 74-83
    • Penzhorn, W.T.1    Kühn, G.J.2
  • 21
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, Springer-Verlag
    • D. R. Stinson. Universal hashing and authentication codes. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 74-85. Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 22
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
    • D. Wagner. A generalized birthday problem. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 288-303. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 288-303
    • Wagner, D.1
  • 23
    • 0019572642 scopus 로고
    • NEW HASH FUNCTIONS and THEIR USE in AUTHENTICATION and SET EQUALITY
    • DOI 10.1016/0022-0000(81)90033-7
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981. (Pubitemid 12444638)
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.