搜索结果: 1-11 共查到“smart card”相关记录11条 . 查询时间(0.078 秒)
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
DES side-channel attack DES key schedule
2017/6/28
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
DES TDES Template Attack
2017/2/20
A new template attack on the DES key scheduling is demonstrated that allows recovery of a sufficiently large portion of the DES key of a recent and widely deployed smart card chip with a {\it single} ...
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
side-channel attacks SHA-3
2016/3/1
As the new SHA-3 standard, the security and reliability of Keccak
have attracted a lot of attentions. Previous works already show that both software
and hardware implementations of Keccak have stron...
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Understanding spatio-temporal mobility patterns for seniors, child/student and adult using smart card data
Transportation Spatio-temporal Mobility Patterns Smart Card Data Network Analysis GIS
2014/12/4
Commutes in urban areas create interesting travel patterns that are often stored in regional transportation databases. These patterns can vary based on the day of the week, the time of the day, and co...
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
smart card-based anonymous verify
2014/3/12
Recently, Khan et al. proposed an enhancement on a remote authentication scheme designed by Wang et al. which emphasizes on using dynamic identity. They claim that their improvement can avoid insider ...
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
Authentication Security Cryptanalysis card Attacks
2010/7/13
The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Ke...
基于多级分布式银行的Smart Card电子支付系统
网络安全 电子商务 电子支付
2009/4/30
在电子支付系统中,采用分布式电子银行方案更适合于网络运行环境,然而在现行的分布式电子银行方案中,每个用户局限在所开帐户的电子银行取得签发的Smart Card和提取或存储电子货币,由于网络的瓶颈作用和安全缺陷,以及用户所处地域的分散性和流动性等因素的限制、使得单一开户的银行方案在实际应用中其分布式特性并未充分得以发挥。针对此,通过采用代理签字与群签字综合的方法,本文提出了多级电子银行的新方案,并对...
适用于Smart Card的有效电子现金解决方案
电子现金 哈希树 Schnorr签名算法
2009/1/4
提出了一个可以在低计算能力、低存储量的硬件(如smart card)上实现的离线电子现金方案。该方案中,电子现金的存储量和效率都比一般的方案优很多,能满足电子现金所需要的安全特性,如匿名性、不可伪造性、多次消费检测等。该文还提出了一个类似的电子票据方案以及通过代理机构代理银行发布电子货币的方案。