×

Found 28 Documents (Results 1–28)

100
MathJax

Formal analysis of distance bounding with secure hardware. (English) Zbl 1440.94097

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 579-597 (2018).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. (English) Zbl 06889992

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 267-283 (2018).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

An efficient and private RFID authentication protocol supporting ownership transfer. (English) Zbl 1412.94183

Avoine, Gildas (ed.) et al., Lightweight cryptography for security and privacy. Second international workshop, LightSec 2013, Gebze, Turkey, May 6–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8162, 130-141 (2013).
MSC:  94A60 68M12 68P25
PDF BibTeX XML Cite
Full Text: DOI

Applying remote side-channel analysis attacks on a security-enabled NFC tag. (English) Zbl 1312.94065

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 207-222 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA. (English) Zbl 1295.94132

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 358-377 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Relations among notions of privacy for RFID authentication protocols. (English) Zbl 1404.94133

Foresti, Sara (ed.) et al., Computer security – ESORICS 2012. 17th European symposium on research in computer security, Pisa, Italy, September 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33166-4/pbk). Lecture Notes in Computer Science 7459, 661-678 (2012).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Lapin: an efficient authentication protocol based on ring-LPN. (English) Zbl 1282.94078

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

A pre-computable signature scheme with efficient verification for RFID. (English) Zbl 1292.68052

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 1-16 (2012).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Private identification of RFID tags. (English) Zbl 1302.94056

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 49-61 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

EPCBC – a block cipher suitable for electronic product code encryption. (English) Zbl 1307.94111

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 76-97 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Addressing flaws in RFID authentication protocols. (English) Zbl 1291.94187

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 216-235 (2011).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems. (English) Zbl 1297.94121

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 92-103 (2011).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI arXiv Link

The LED block cipher. (English) Zbl 1291.94092

Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 326-341 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Implementation of symmetric algorithms on a synthesizable 8-bit microcontroller targeting passive RFID tags. (English) Zbl 1290.94120

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 114-129 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of reduced-round MIBS block cipher. (English) Zbl 1294.94033

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 1-19 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Weaknesses in two recent lightweight RFID authentication protocols. (English) Zbl 1281.94086

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 383-392 (2010).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. (English) Zbl 1287.94088

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 58-75 (2009).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

SQUASH – a new MAC with provable security properties for highly constrained devices such as RFID tags. (English) Zbl 1154.68410

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 144-157 (2008).
MSC:  68P25 68N99
PDF BibTeX XML Cite
Full Text: DOI

Traceable privacy of recent provably-secure RFID protocols. (English) Zbl 1319.94094

Bellovin, Steven M. (ed.) et al., Applied cryptography and network security. 6th international conference, ACNS 2008, New York, NY, USA, June 3–6, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68913-3/pbk). Lecture Notes in Computer Science 5037, 479-489 (2008).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

New lightweight DES variants. (English) Zbl 1184.94241

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 196-210 (2007).
MSC:  94A60 68P25 68N99
PDF BibTeX XML Cite
Full Text: DOI

Searching for compact algorithms: CGEN. (English) Zbl 1295.94137

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 37-49 (2006).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

New security problem in RFID systems “Tag Killing”. (English) Zbl 1172.68463

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 375-384 (2006).
MSC:  68P25
PDF BibTeX XML Cite
Full Text: DOI

Towards provable security for ubiquitous applications. (English) Zbl 1176.94034

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 295-312 (2006).
MSC:  94A60 94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Public key authentication with one (online) single addition. (English) Zbl 1104.68474

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 413-427 (2004).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Strong authentication for RFID systems using the AES algorithm. (English) Zbl 1104.68471

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 357-370 (2004).
MSC:  68P25 94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

Classification

all top 3

Software