Sciweavers

35 search results - page 3 / 7
» Making Sense of Smart Card Security Certifications
Sort
View
IACR
2011
207views more  IACR 2011»
12 years 5 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
ICPR
2004
IEEE
14 years 6 months ago
Face Verification System Architecture Using Smart Cards
A smart card based face verification system is proposed in which the feature extraction and decision making is performed on the card. Such an architecture has many privacy and sec...
Josef Kittler, Kieron Messer, Thirimachos Bourlai
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
13 years 11 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames
CCR
2000
101views more  CCR 2000»
13 years 5 months ago
Knowledge-proof based versatile smart card verification protocol
We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ri...
Dae Hun Nyang, Joo-Seok Song
WISTP
2007
Springer
13 years 12 months ago
A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networks
The network is becoming more and more versatile because of the variety of the computing resources and the communication technologies that have become available. The mobility of the...
Eve Atallah, Serge Chaumette