-
1
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
K. Etessami and S. Rajamani, eds
-
A. Armando, et al., "The AVISPA tool for the automated validation of internet security protocols and applications," in Proceedings of 17th International Conference on Computer Aided Verification (K. Etessami and S. Rajamani, eds.), vol. 3576, pp. 281-285, 2005.
-
(2005)
Proceedings of 17th International Conference on Computer Aided Verification
, vol.3576
, pp. 281-285
-
-
Armando, A.1
-
2
-
-
84874466469
-
HLPSL tutorial the Beginner's guide to modelling and analysing internet security protocols
-
Technical Report, AVISPA project
-
The AVISPA Team, "HLPSL tutorial the Beginner's guide to modelling and analysing internet security protocols," Technical Report, AVISPA project, 2006.
-
(2006)
-
-
-
3
-
-
70350633827
-
Reducing key lengths with QC alternant codes
-
T. P. Berger, P. L. Cayrel, P. Gaborit, and A. Otmani, "Reducing key lengths with QC alternant codes," in Proceedings of Africacrypt 2009, vol. 5580, pp. 77-97, 2009.
-
(2009)
Proceedings of Africacrypt 2009
, vol.5580
, pp. 77-97
-
-
Berger, T.P.1
Cayrel, P.L.2
Gaborit, P.3
Otmani, A.4
-
4
-
-
56749164782
-
Attacking and defending the McEliece cryptosystem
-
LNCS 5299
-
D. J. Bernstein, T. Lange, and C. Peters, "Attacking and defending the McEliece cryptosystem," in 2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08), LNCS 5299, pp. 31-46, 2008.
-
(2008)
2nd International Workshop on Post-Quantum Cryptography (PQCRYPTO'08)
, pp. 31-46
-
-
Bernstein, D.J.1
Lange, T.2
Peters, C.3
-
5
-
-
77949553535
-
Cryptanalysis of two RFID authentication protocols
-
T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, pp. 95-100, 2009.
-
(2009)
International Journal of Network Security
, vol.9
, pp. 95-100
-
-
Cao, T.1
Shen, P.2
-
6
-
-
85103361301
-
Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
-
LNCS 7293
-
P. L. Cayrel, G. Hoffmann, and E. Persichetti, "Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes," in Proceedings of PKC'2012, LNCS 7293, pp. 138-155, 2012.
-
(2012)
Proceedings of PKC'2012
, pp. 138-155
-
-
Cayrel, P.L.1
Hoffmann, G.2
Persichetti, E.3
-
7
-
-
79953072900
-
RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards
-
C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, "RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards," International Journal of Network Security, vol. 13, pp. 41-48, 2011.
-
(2011)
International Journal of Network Security
, vol.13
, pp. 41-48
-
-
Chen, C.L.1
Lai, Y.L.2
Chen, C.C.3
Deng, Y.Y.4
Hwang, Y.C.5
-
9
-
-
68849120029
-
ECC-based lightweight authentication protocol with untraceability for lowcost RFID
-
H. Y. Chien and C. S. Laih, "ECC-based lightweight authentication protocol with untraceability for lowcost RFID," Journal of Parallel and Distributed Computing, vol. 69, pp. 848-853, 2009.
-
(2009)
Journal of Parallel and Distributed Computing
, vol.69
, pp. 848-853
-
-
Chien, H.Y.1
Laih, C.S.2
-
10
-
-
0015565580
-
Enumerative source encoding
-
T. M. Cover, "Enumerative source encoding," IEEE Transactions on Information Theory, vol. 19, no. 1, pp. 73-77, 1973.
-
(1973)
IEEE Transactions on Information Theory
, vol.19
, Issue.1
, pp. 73-77
-
-
Cover, T.M.1
-
11
-
-
34547653526
-
Lightweight asymmetric privacy-preserving authentication protocols secure against active attack
-
Y. Cui, K. Kobara, K. Matsuura, and H. Imai, "Lightweight asymmetric privacy-preserving authentication protocols secure against active attack," in Proceedings of the Fifth Annual IEEE International Conference (PerComW'07), pp. 223-228, 2007.
-
(2007)
Proceedings of the Fifth Annual IEEE International Conference (PerComW'07)
, pp. 223-228
-
-
Cui, Y.1
Kobara, K.2
Matsuura, K.3
Imai, H.4
-
12
-
-
44649113207
-
Untraceability of RFID protocols
-
V. Deursen, S. Mauw, and S. Radomirovic, "Untraceability of RFID protocols," Information Security Theory and Practices, Smart Devices, Convergence and Next Generation Networks, pp. 1-15, 2008.
-
(2008)
Information Security Theory and Practices, Smart Devices, Convergence and Next Generation Networks
, pp. 1-15
-
-
Deursen, V.1
Mauw, S.2
Radomirovic, S.3
-
14
-
-
77954636190
-
Algebraic cryptanalysis of McEliece variants with compact keys
-
J. C. Faugère, A. Otmani, L. Perret, and J. P. Tillich, "Algebraic cryptanalysis of McEliece variants with compact keys," in Proceedings of the 29th International Conference on Cryptology (EUROCRYPT'10 2010), pp. 279-298, 2010.
-
(2010)
Proceedings of the 29th International Conference on Cryptology (EUROCRYPT'10 2010)
, pp. 279-298
-
-
Faugère, J.C.1
Otmani, A.2
Perret, L.3
Tillich, J.P.4
-
15
-
-
79960766850
-
A distinguisher for high rate McEliece cryptosystems
-
J. C. Faugère, A. Otmani, L. Perret, and J. P. Tillich, "A distinguisher for high rate McEliece cryptosystems," Technical Report 2010/331, Cryptology ePrint Archive, 2010.
-
(2010)
Cryptology ePrint Archive
-
-
Faugère, J.C.1
Otmani, A.2
Perret, L.3
Tillich, J.P.4
-
17
-
-
84903879790
-
On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
-
W. Khedr, "On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags," International Journal of Network Security, vol. 16, no. 5, pp. 369-375, 2014.
-
(2014)
International Journal of Network Security
, vol.16
, Issue.5
, pp. 369-375
-
-
Khedr, W.1
-
18
-
-
44449145213
-
Personalized-public-key cryptosystem (P2KC) Application where publickey size of Niederreiter PKC can be reduced
-
K. Kobara and H. Imai, "Personalized-public-key cryptosystem (P2KC) Application where publickey size of Niederreiter PKC can be reduced," in Workshop on Codes and Lattices in Cryptography (CLC'06), pp. 61-68, 2006.
-
(2006)
Workshop on Codes and Lattices in Cryptography (CLC'06)
, pp. 61-68
-
-
Kobara, K.1
Imai, H.2
-
20
-
-
0003777826
-
A public-key system based on algebraic coding theory
-
Technical Report
-
R. J. McEliece, "A public-key system based on algebraic coding theory," Technical Report, DSN Progress Report 44, Jet Propulsion Lab, 1978.
-
(1978)
Jet Propulsion Lab
-
-
McEliece, R.J.1
-
21
-
-
84935456608
-
-
The Mifar Cards, 2015. (http://www.mifare.net)
-
(2015)
The Mifar Cards
-
-
-
23
-
-
84858269835
-
Reliable and low cost RFID based authentication system for large scale deployment
-
M. Naveed, W. Habib, U. Masud, U. Ullah, and G. Ahmad, "Reliable and low cost RFID based authentication system for large scale deployment," International Journal of Network Security, vol. 14, pp. 173-170, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, pp. 170-173
-
-
Naveed, M.1
Habib, W.2
Masud, U.3
Ullah, U.4
Ahmad, G.5
-
24
-
-
51349142711
-
Semantic security for the McEliece cryptosystem without random oracles
-
R. Nojima, H. Imai, K. Kobara, and K. Morozov, "Semantic security for the McEliece cryptosystem without random oracles," Designs, Codes and Cryptography, vol. 49, no. 1-3, pp. 289-305, 2008.
-
(2008)
Designs, Codes and Cryptography
, vol.49
, Issue.1-3
, pp. 289-305
-
-
Nojima, R.1
Imai, H.2
Kobara, K.3
Morozov, K.4
-
25
-
-
41549161615
-
Privacy of recent RFID authentication protocols
-
L. Chen, Y. Mu, and W. Susilo, eds, LNCS 4991
-
K. Ouafi and R. C. W. Phan, "Privacy of recent RFID authentication protocols," in Proceedings of ISPEC'08 (L. Chen, Y. Mu, and W. Susilo, eds.), LNCS 4991, pp. 263-277, 2008.
-
(2008)
Proceedings of ISPEC'08
, pp. 263-277
-
-
Ouafi, K.1
Phan, R.C.W.2
-
26
-
-
0346895307
-
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
-
C. S. Park, "Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems," Computer Networks, vol. 44, pp. 267-273, 2004.
-
(2004)
Computer Networks
, vol.44
, pp. 267-273
-
-
Park, C.S.1
-
27
-
-
0015346058
-
An algorithm for source coding
-
P. M. Schalkwijk, "An algorithm for source coding," IEEE Transactions of Information Theory, vol. 18, no. 3, pp. 395-399, 1972.
-
(1972)
IEEE Transactions of Information Theory
, vol.18
, Issue.3
, pp. 395-399
-
-
Schalkwijk, P.M.1
-
28
-
-
79551626469
-
Privacy enhanced RFID using Quasi-Dyadic fix domain shrinking
-
T. Sekino, Y. Cui, K. Kobara, and H. Imai, "Privacy enhanced RFID using Quasi-Dyadic fix domain shrinking," in Proceedings of Global Telecommunications Conference (GLOBECOM'10), pp. 1-5, 2010.
-
(2010)
Proceedings of Global Telecommunications Conference (GLOBECOM'10)
, pp. 1-5
-
-
Sekino, T.1
Cui, Y.2
Kobara, K.3
Imai, H.4
-
29
-
-
70449478600
-
Encoding information into constant weight words
-
N. Sendrier, "Encoding information into constant weight words," in IEEE Conference on ISIT'05, pp. 435-438, 2005.
-
(2005)
IEEE Conference on ISIT'05
, pp. 435-438
-
-
Sendrier, N.1
-
30
-
-
34548142603
-
Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search
-
M. Suzuki, K. Kobara, and H. Imai, "Privacy enhanced and light weight RFID system without tag synchronization and exhaustive search," in Proceedings of 2006 IEEE International Conference on Systems, Man, and Cybernetics, pp. 1250-1255, 2006.
-
(2006)
Proceedings of 2006 IEEE International Conference on Systems, Man, and Cybernetics
, pp. 1250-1255
-
-
Suzuki, M.1
Kobara, K.2
Imai, H.3
-
31
-
-
84884726168
-
Code based cryptography and steganography
-
LNCS 8080
-
P. Véron, "Code based cryptography and steganography," in Proceedings of CAI'13, LNCS 8080, pp. 9-46, 2013.
-
(2013)
Proceedings of CAI'13
, pp. 9-46
-
-
Véron, P.1
-
32
-
-
79956297141
-
An authentication protocol for low-cost RFID tags
-
C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "An authentication protocol for low-cost RFID tags," International Journal of Mobile Communications, vol. 9, no. 2, pp. 208-223, 2011.
-
(2011)
International Journal of Mobile Communications
, vol.9
, Issue.2
, pp. 208-223
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
-
33
-
-
79953083437
-
A mutual authentication protocol for RFID
-
C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "A mutual authentication protocol for RFID," IEEE IT Professional, vol. 13, no. 2, pp. 20-24, 2011.
-
(2011)
IEEE IT Professional
, vol.13
, Issue.2
, pp. 20-24
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
-
34
-
-
84866074525
-
An improved authentication protocol for mobile agent device in RFID
-
C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "An improved authentication protocol for mobile agent device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp. 508-520, 2012.
-
(2012)
International Journal of Mobile Communications
, vol.10
, Issue.5
, pp. 508-520
-
-
Wei, C.H.1
Hwang, M.S.2
Chin, A.Y.H.3
|