A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
スポンサーリンク
概要
- 論文の詳細を見る
- 2009-02-01
著者
-
CARRIJO José
Department of Electrical Engineering, University of Brasilia (UnB)
-
TONICELLI Rafael
Department of Electrical Engineering, University of Brasilia (UnB)
-
NASCIMENTO Anderson
Department of Electrical Engineering, University of Brasilia (UnB)
-
Imai Hideki
Faculty Of Science And Engineering Chuo University:research Center For Information Security (rcis) N
-
Nascimento Anderson
Department Of Electrical Engineering University Of Brasilia Campus Universitario Darcy Ribeiro
-
Nascimento Anderson
Department Of Electrical Engineering University Of Brasilia
-
Tonicelli Rafael
Department Of Electrical Engineering University Of Brasilia Campus Universitario Darcy Ribeiro
-
Tonicelli Rafael
Department Of Electrical Engineering University Of Brasilia (unb)
-
Imai Hideki
Faculty Of Engineering Yokohama National University
-
Carrijo Jose
Department Of Electrical Engineering University Of Brasilia (unb)
関連論文
- A Fault Analytic Method against HB+
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Extension of Broadcasting Service by Using Electronic Tokens(Contents Technology and Web Information Systems)
- Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service(Discrete Mathematics and Its Applications)
- A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
- A Novel Probabilistic Passive Attack on the Protocols HB and HB^+
- Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
- Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
- Asymmetric RFID System Secure against Active Attack
- The MAC-based Construction of Strong Multiple Encryption
- Efficient Strong Multiple Encryption from Relaxed Conditions
- ID-based Encryption for Directed Acyclic Graph Hierarchies : Unification of Key-evolving Encryption Primitives (Extended Abstract)
- Shielding Asymmetric Cryptosystems from Decryption Failures
- A Bandwidth-Saving Public Key Encryption Conversion Scheme
- Invisibly Sanitizable Digital Signature Scheme
- An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
- Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes(Information Security)
- A Novel Approach to Algebraic and Fast Correlation Attacks for Cryptanalysis of Certain Keystream Generators
- CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
- Formal Security Treatments for IBE-to-Signature Transformation : Relations among Security Notions
- A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
- Key-Insulated Public Key Encryption with Auxiliary Helper Key : Model, Constructions and Formal Security Proofs(Information Theory and Its Applications)
- Efficient Identity-Based Encryption with Tight Security Reduction(Information Theory and Its Applications)
- A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key
- Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption
- Searchable Public-key Broadcast Encryption
- Relations among Notions of Security for Identity Based Encryption Schemes (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Towards Security Enhancement with Efficient Reduction for Identity Based Encryption
- CCA-secure IBE Scheme with Tight Security Reduction based on the Gap BDH Assumption
- A Remark on GEM
- An Implementation of KPS with Distributed Trust
- Managing Encryption and Key Publication Independently in Digital Rights Management Systems (Applications) (Cryptography and Information Security)
- On the oblivious transfer capacity of the erasure channel
- New Short Signature Scheme without Random Oracles
- A Trade-off Traitor Tracing Scheme
- Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
- Adaptive Equalization with Dual Diversity-Combining (Special Issue on Land Mobile/Portable Propagation)
- A Fault Analytic Method against HB^+
- Secure Broadcast System with Simultaneous Individual Messaging
- Oblivious Transfer Based on the McEliece Assumptions
- Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels (Special Issue on Land Mobile/Portable Propagation)
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack