Sciweavers

104 search results - page 2 / 21
» Protocol Interactions and the Chosen Protocol Attack
Sort
View
ISW
2010
Springer
13 years 3 months ago
Cryptanalysis of the Convex Hull Click Human Identification Protocol
Recently a convex hull based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the p...
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, H...
INDOCRYPT
2009
Springer
14 years 3 days ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
JCSS
2006
102views more  JCSS 2006»
13 years 5 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
JSW
2008
122views more  JSW 2008»
13 years 5 months ago
Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Tieyan Li, Guilin Wang, Robert H. Deng
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 5 days ago
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
Abstract. In the paper “Stronger Security of Authenticated Key Exchange” [1,2], a new security model for authenticated key exchange protocols (eCK) is proposed. The new model i...
Cas J. F. Cremers