Sciweavers

33 search results - page 3 / 7
» Cryptanalysis of the RSA-CEGD protocol
Sort
View
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 5 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
CORR
2011
Springer
163views Education» more  CORR 2011»
13 years 2 months ago
Cryptanalysis of three matrix-based key establishment protocols
We cryptanalyse a matrix-based key transport protocol due to Baumslag, Camps, Fine, Rosenberger and Xu from 2006. We also cryptanalyse two recently proposed matrix-based key agree...
Simon R. Blackburn, Carlos Cid, Ciaran Mullan
IACR
2011
182views more  IACR 2011»
12 years 7 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
JCM
2008
138views more  JCM 2008»
13 years 7 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 7 months ago
Cryptanalysis of Syverson's Rational Exchange Protocol
The notion of rational exchange introduced by Syverson in 1998 is a particularly interesting alternative when an efficient scheme for fair exchange is required but the existence o...
Almudena Alcaide, Juan M. Estévez-Tapiador,...