Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
Abstract. One of the main challenges in RFIDs is the design of privacypreserving authentication protocols. Indeed, such protocols should not only allow legitimate readers to authen...
In this paper a secure error-signalling scheme for packetswitched network architectures is presented. Current solutions are based on the Internet Control Message Protocol to deliv...
We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general “compiler” improving the secur...
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...