搜索结果: 1-15 共查到“军事学 Authentication protocols”相关记录18条 . 查询时间(0.078 秒)
Attacks on the PUF-Based Authentication Protocols YeHL16 and GaoMAAR17
PUF cryptographic protocols
2017/11/28
A physically unclonable function (PUF) is a circuit of which the input–output behavior is designed to be sensitive to the random variations of its manufacturing process. This building block hence faci...
Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques
zero knowledge procedures graph isomorphism problem multivariate polynomial system
2016/7/29
Several cryptographic methods have been developed based on the difficulty to determine the set
of solutions of a polynomial system over a given field. We build a polynomial ideal whose algebraic
set...
Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols
Authentication Protocols Smart Cards DoS
2016/1/25
In this work we consider two protocols for performing cryptanalysis
and security enhancement. The first one by Jiang et al., is a
password-based authentication scheme1 which does not use smart cards...
Secure and Efficient Initialization and Authentication Protocols for SHIELD
Supply Chain Security SHIELD Initialization Protocol
2016/1/3
With the globalization of semiconductor production, out-sourcing IC fabrication has become
a trend in various aspects. This, however, introduces serious threats from the entire untrusted
supply chai...
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks
Authentication Smart Cards
2014/3/6
In this paper, we construct two statistical zero-knowledge authentication protocols for smart cards based on general assumptions. The first protocol can only resist active attacks, where the smart car...
Recently, Tsai et al., Liao et al. and Li et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, we found some...
On the construction of digest functions for manual authentication protocols
the construction digest functions manual authentication protocols
2011/3/11
A digest function is a sort of universal hash that takes a key and a message as its
inputs. This paper will study these functions' properties and design in the context of their
application in manual...
We use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particula...
We use ideas from game theory to transform two families of authentication protocols so that even an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particula...
Scalability and Security Conict for RFID Authentication Protocols
Scalability Security Conict RFID Authentication Protocols
2010/1/18
Many RFID authentication protocols have been proposed to
preserve security and privacy. Nevertheless, most of these protocols are
analyzed and it is shown that they can not provide security against ...
Improvements on two password-based authentication protocols
smart card password authentication protocol password change
2009/12/29
Recently, Liao et al. and Hölbl et al. each proposed a user authentication protocol,
respectively. Both claimed that their schemes can withstand various attacks. However,
Xiang et al. pointed o...
Security weaknesses in two multi-server password based authentication protocols
multi-server remote password authenticationl smart card
2009/7/14
In 2004 and 2005, Tsaur et al. proposed a smart card based password authentication
schemes for multi-server environments, respectively. They claimed that their
protocols are safe and can withstand ...
Efficient group authentication protocols based on human interaction
Efficient group authentication protocols PKI
2009/6/12
A preliminary version of this paper appeared in the informal proceedingds
of the workshop on Foundation of Computer Security and Automated
Reasoning Protocol Security Analysis, pp. 9-31 (FCS-ARSPA 2...
Comments on two multi-server authentication protocols
multi-server password authentication protocol server spoofing attack
2009/6/11
Recently, Tsai and Liao et al. each proposed a multi-server authentication protocol.
They claimed their protocols are secure and can withstand various attacks. But we
found some security loopholes i...
Efficient RFID authentication protocols based on pseudorandom sequence generators
authentication protocol pseudorandom sequence generator stream cipher
2009/6/5
In this paper, we introduce a new class of PRSGs, called par-
titioned pseudorandom sequence generators(PPRSGs), and propose an
RFID authentication protocol using a PPRSG, called S-protocol. Since
...