-
1
-
-
70350633827
-
Reducing key length of the mceliece cryptosystem
-
Lecture Notes in Computer Science, 5580. Springer-Verlag
-
Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani. Reducing Key Length of the McEliece Cryptosystem. In Advances in Cryptology (AFRICACRYPT'09), Lecture Notes in Computer Science, vol. 5580, pages 77-97. Springer-Verlag, 2009.
-
(2009)
Advances in Cryptology (AFRICACRYPT'09)
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.-L.2
Gaborit, P.3
Otmani, A.4
-
2
-
-
0017973512
-
On the inherent intractability of certain coding problems
-
Elwyn R. Berlekamp, Robert McEliece, and Henk C. A. Van TilBorg. On the inherent intractability of certain coding problems. IEEE Transactions on Information Theory, 24(3):384-386, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, Issue.3
, pp. 384-386
-
-
Berlekamp, E.R.1
McEliece, R.2
Van Tilborg, H.C.A.3
-
3
-
-
56749164782
-
Attacking and defending the mceliece cryptosystem
-
Springer-Verlag
-
Daniel J. Bernstein, Tanja Lange, and Christiane Peters. Attacking and Defending the McEliece Cryptosystem. In 2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08), volume 5299, pages 31-46. Springer-Verlag, 2008.
-
(2008)
2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08)
, vol.5299
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
4
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
Hung-Yu Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing, 4(4):337-340, 2007.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
5
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Lecture Notes in Computer Science, 3156. Springer-Verlag
-
Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), Lecture Notes in Computer Science, vol. 3156, pages 357-370. Springer-Verlag, 2004.
-
(2004)
Workshop on Cryptographic Hardware and Embedded Systems (CHES'04)
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
6
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
Lecture Notes in Computer Science, vol. 4277. Springer- Verlag
-
Martin Feldhofer and Christian Rechberger. A Case Against Currently Used Hash Functions in RFID Protocols. In OTM 2006 Workshops, Lecture Notes in Computer Science, vol. 4277, pages 372-381. Springer- Verlag, 2006.
-
(2006)
OTM 2006 Workshops
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
8
-
-
84871963980
-
-
International Organization for Standardization. ISO/IEC 9798-2: Information Technology Security techniques Entity Authentication Mechanisms. ISO/IEC
-
International Organization for Standardization. ISO/IEC 9798-2: Information Technology Security techniques Entity Authentication Mechanisms. Part 2: Entity authentication using symmetric techniques. ISO/IEC, 1993.
-
(1993)
Part 2: Entity Authentication Using Symmetric Techniques
-
-
-
10
-
-
44449155290
-
HB#: Increasing the security and efficiency of HB+
-
Lecture Notes in Computer Science, vol. 4965, Springer
-
Henri Gilbert, Matthew J.B. Robshaw, and Yannick Seurin. HB#: increasing the security and efficiency of HB+. In Advances in Cryptology (Eurocrypt'08), Lecture Notes in Computer Science, vol. 4965, pages 361-378. Springer, 2008.
-
(2008)
Advances in Cryptology (Eurocrypt'08)
, pp. 361-378
-
-
Gilbert, H.1
Robshaw, M.J.B.2
Seurin, Y.3
-
11
-
-
27644472569
-
An active attack against HB+: A provably secure lightweight authentication protocol
-
Henri Gilbert, Matthew J.B. Robshaw, and Herv Sibert. An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol. IEE Electronics Letters, 41(21):1169-1170, 2005.
-
(2005)
IEE Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, B.M.J.2
Sibert, H.3
-
13
-
-
30344469114
-
Authenticating pervasive devices with human protocols
-
Lecture Notes in Computer Science, vol. 3126, Springer
-
Ari Juels and Stephen A. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology (Crypto'05), Lecture Notes in Computer Science, vol. 3126, pages 198-293. Springer, 2005.
-
(2005)
Advances in Cryptology (Crypto'05)
, pp. 198-198
-
-
Juels, A.1
Weis, S.A.2
-
14
-
-
84871971448
-
-
RSA Laboratories. Online, August
-
RSA Laboratories. Technical Characteristics of RFID. Online, August 2010. http://www.rsa.com/rsalabs/node.asp?id=2121.
-
(2010)
Technical Characteristics of RFID
-
-
-
15
-
-
84871996294
-
Private identification of RFID tags
-
Lecture Notes in Computer Science. Springer-Verlag
-
Behzad Malek and Ali Miri. Private Identification of RFID Tags. In Foundations & Practice of Security, Lecture Notes in Computer Science, pages 352-361. Springer-Verlag, 2011.
-
(2011)
Foundations & Practice of Security
, pp. 352-361
-
-
Malek, B.1
Miri, A.2
-
17
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
ACM, ACM Press
-
David Molnar and David Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In Conference on Computer and Communications Security (CCS'04), pages 210-219. ACM, ACM Press, 2004.
-
(2004)
Conference on Computer and Communications Security (CCS'04)
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
18
-
-
85038209127
-
Textitsemantic security for the McEliece cryptosystem without random oracles
-
Ryo Nojima, Hideki Imai, Kazukuni Kobara, and Kirill Morozov. textitSemantic security for the McEliece cryptosystem without random oracles. Designs, Codes and Cryptography, 49(1):289-305, 2008.
-
(2008)
Designs, Codes and Cryptography
, vol.49
, Issue.1
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
19
-
-
33845455482
-
EMAP: An efficient mutual authentication protocol for low-cost RFID tags
-
Lecture Notes in Computer Science, vol. 4277. Springer-Verlag
-
Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez- Tapiador, and Arturo Ribagorda. EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In OTM Workshops On the Move to Meaningful Internet Systems, Lecture Notes in Computer Science, vol. 4277, pages 352-361. Springer-Verlag, 2006.
-
(2006)
OTM Workshops on the Move to Meaningful Internet Systems
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernández Castro, J.C.2
Estévez-Tapiador, J.M.3
Ribagorda, A.4
-
20
-
-
70350625235
-
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
-
Lecture Notes in Computer Science, vol. 5379, Springer
-
Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez- Tapiador, and Arturo Ribagorda. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. In International Workshop Information Security Applications: WISA'08, Lecture Notes in Computer Science, vol. 5379, pages 56-68. Springer, 2009.
-
(2009)
International Workshop Information Security Applications: WISA'08
, pp. 56-68
-
-
Peris-Lopez, P.1
Hernández Castro, J.C.2
Estévez-Tapiador, J.M.3
Ribagorda, A.4
-
21
-
-
24144483054
-
Efficient AES implementations on ASICs and FPGAs
-
Lecture Notes in Computer Science, vol. 3373, Springer
-
Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, and Johannes Wolkerstorfer. Efficient AES Implementations on ASICs and FPGAs. In Advanced Encryption Standard (AES'05), Lecture Notes in Computer Science, vol. 3373, pages 98-112. Springer, 2005.
-
(2005)
Advanced Encryption Standard (AES'05)
, pp. 98-112
-
-
Pramstaller, N.1
Mangard, S.2
Dominikus, S.3
Wolkerstorfer, J.4
|