Sciweavers

356 search results - page 9 / 72
» AUTHMAC_DH: A New Protocol for Authentication and Key Distri...
Sort
View
RFIDSEC
2010
13 years 6 months ago
Strong Authentication and Strong Integrity (SASI) Is Not That Strong
In this work, we present a practical passive attack on SASI, an ultra-lightweight mutual authentication protocol for RFID. This attack can be used to reveal with overwhelming proba...
Gildas Avoine, Xavier Carpent, Benjamin Martin 000...
CARDIS
1998
Springer
89views Hardware» more  CARDIS 1998»
13 years 11 months ago
Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card t...
Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim R...
MIDDLEWARE
2005
Springer
14 years 1 months ago
A new two-message authentication protocol for RFID sensor networks
Ê Ó Ö ÕÙ Ò Ý Á ÒØ Ø ÓÒ ´Ê Á µ Ø ÒÓÐÓ Ý × Ñ ¹ Ø Ó ØÓ Ö ÑÓØ ÐÝ ×ØÓÖ Ò Ö ØÖ Ú Ø Ù× Ò ×Ñ ÐÐ Ñ ¹ ÖÓ Ô ÐÐ Ø Ê Á Ø ...
Selma Boumerdassi, Papa Kane Diop, Éric Ren...
DCC
2008
IEEE
14 years 7 months ago
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
Berkant Ustaoglu
JUCS
2008
166views more  JUCS 2008»
13 years 7 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang