메뉴 건너뛰기




Volumn 7533 LNCS, Issue , 2012, Pages 100-120

On the pseudorandom function assumption in (secure) distance-bounding protocols: PRF-ness alone does not stop the frauds!

Author keywords

[No Author keywords available]

Indexed keywords

MAN IN THE MIDDLES (MITM); PROGRAMMING TECHNIQUE; PSEUDORANDOM FUNCTIONS; SECURITY FLAWS;

EID: 84866021748     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-33481-8_6     Document Type: Conference Paper
Times cited : (25)

References (16)
  • 2
    • 70350424442 scopus 로고    scopus 로고
    • An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Avoine, G., Tchamkerten, A.: An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 250-261. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 250-261
    • Avoine, G.1    Tchamkerten, A.2
  • 3
    • 84976295016 scopus 로고
    • Distance Bounding Protocols
    • Extended Abstract Helleseth, T. (ed.) EUROCRYPT 1993. Springer, Heidelberg
    • Brands, S., Chaum, D.: Distance Bounding Protocols (Extended Abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344-359. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 4
    • 79959462113 scopus 로고    scopus 로고
    • Distance hijacking attacks on distance bounding protocols
    • ePrint Archive, Report 2011/129
    • Cremers, C., Rasmussen, K.B., Čapkun, S.: Distance hijacking attacks on distance bounding protocols. Cryptology ePrint Archive, Report 2011/129 (2011), http://eprint.iacr.org/
    • (2011) Cryptology
    • Cremers, C.1    Rasmussen, K.B.2    Čapkun, S.3
  • 6
    • 80054817974 scopus 로고    scopus 로고
    • A Formal Approach to Distance-Bounding RFID Protocols
    • Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. Springer, Heidelberg
    • Dürholz, U., Fischlin, M., Kasper, M., Onete, C.: A Formal Approach to Distance-Bounding RFID Protocols. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 47-62. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7001 , pp. 47-62
    • Dürholz, U.1    Fischlin, M.2    Kasper, M.3    Onete, C.4
  • 7
    • 84866028865 scopus 로고    scopus 로고
    • Provably secure distance-bounding: An analysis of prominent protocols
    • ePrint Archive, Report 2012/128
    • Fischlin, M., Onete, C.: Provably secure distance-bounding: an analysis of prominent protocols. Cryptology ePrint Archive, Report 2012/128 (2012)
    • (2012) Cryptology
    • Fischlin, M.1    Onete, C.2
  • 11
    • 71549138804 scopus 로고    scopus 로고
    • RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kim, C.H., Avoine, G.: RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 119-133. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 119-133
    • Kim, C.H.1    Avoine, G.2
  • 12
    • 67049155493 scopus 로고    scopus 로고
    • The Swiss-Knife RFID Distance Bounding Protocol
    • Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. Springer, Heidelberg
    • Kim, C.H., Avoine, G., Koeune, F., Standaert, F.-X., Pereira, O.: The Swiss-Knife RFID Distance Bounding Protocol. In: Lee, P.J., Cheon, J.H. (eds.) ICISC 2008. LNCS, vol. 5461, pp. 98-115. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5461 , pp. 98-115
    • Kim, C.H.1    Avoine, G.2    Koeune, F.3    Standaert, F.-X.4    Pereira, O.5
  • 13
    • 84937429269 scopus 로고    scopus 로고
    • A Threshold Pseudorandom Function Construction and Its Applications
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Nielsen, J.B.: A Threshold Pseudorandom Function Construction and Its Applications. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 401-416. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 401-416
    • Nielsen, J.B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.