Public key cryptography and RFID tags (English)
- New search for: McLoone, M.
- New search for: Robshaw, M.J.B.
- New search for: McLoone, M.
- New search for: Robshaw, M.J.B.
In:
Topics in Cryptology, CT-RSA, Cryptographers' Track at the RSA Conference, 2007, RSA Conference, 2007
;
372-384
;
2006
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Public key cryptography and RFID tags
-
Additional title:Public-Key-Kryptographie und RFID-Tags
-
Contributors:McLoone, M. ( author ) / Robshaw, M.J.B. ( author )
-
Published in:Lecture Notes in Computer Science ; 4377 ; 372-384
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2006
-
Size:13 Seiten, 5 Bilder, 4 Tabellen, 20 Quellen
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving BuffersKeller, N. / Miller, S. D. / Mironov, I. / Venkatesan, R. et al. | 2006
- 20
-
A Simple Related-Key Attack on the Full SHACAL-1Biham, E. / Dunkelman, O. / Keller, N. et al. | 2006
- 31
-
Impossibility Proofs for RSA Signatures in the Standard ModelPaillier, P. et al. | 2006
- 49
-
Selecting Secure PasswordsVerheul, E. R. et al. | 2006
- 67
-
Human Identification Through Image Evaluation Using Secret PredicatesJameel, H. / Shaikh, R. A. / Lee, H. / Lee, S. et al. | 2006
- 85
-
Cryptanalysis of Reduced Variants of the FORK-256 Hash FunctionMendel, F. / Lano, J. / Preneel, B. et al. | 2006
- 101
-
Second Preimages for SMASHLamberger, M. / Pramstaller, N. / Rechberger, C. / Rijmen, V. et al. | 2006
- 112
-
A Practical Optimal Padding for Signature SchemesQian, H. / Li, Z. / Chen, Z. / Yang, S. et al. | 2006
- 129
-
Directed Transitive Signature SchemeYi, X. et al. | 2006
- 145
-
Identity-Based Multi-signatures from RSABellare, M. / Neven, G. et al. | 2006
- 163
-
Improved Efficiency for Private Stable MatchingFranklin, M. / Gondree, M. / Mohassel, P. et al. | 2006
- 178
-
Compact E-Cash from Bounded AccumulatorAu, M. H. / Wu, Q. / Susilo, W. / Mu, Y. et al. | 2006
- 196
-
Batch Processing of Interactive ProofsChida, K. / Yamamoto, G. et al. | 2006
- 208
-
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash CallsSilverman, J. H. / Whyte, W. et al. | 2006
- 225
-
Predicting Secret Keys Via Branch PredictionAciicmez, O. / Koc, C. K. / Seifert, J.-P. et al. | 2006
- 243
-
Template Attacks on Masking-Resistance Is FutileOswald, E. / Mangard, S. et al. | 2006
- 257
-
Differential Power Analysis of Stream CiphersFischer, W. / Gammel, B. M. / Kniffler, O. / Velten, J. et al. | 2006
- 271
-
Cache Based Remote Timing Attack on the AESAciicmez, O. / Schindler, W. / Koc, C. K. et al. | 2006
- 287
-
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key AgreementJarecki, S. / Kim, J. / Tsudik, G. et al. | 2006
- 309
-
Efficient Password-Authenticated Key Exchange Based on RSAPark, S. / Nam, J. / Kim, S. / Won, D. et al. | 2006
- 324
-
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy ChannelsDesmedt, Y. / Jakimoski, G. et al. | 2006
- 339
-
A Practical and Tightly Secure Signature Scheme Without Hash FunctionChevallier-Mames, B. / Joye, M. et al. | 2006
- 357
-
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable SignatureSteinfeld, R. / Pieprzyk, J. / Wang, H. et al. | 2006
- 372
-
Public Key Cryptography and RFID TagsMcLoone, M. / Robshaw, M. J. B. et al. | 2006
- 385
-
A Bit-Slice Implementation of the Whirlpool Hash FunctionScheibelhofer, K. et al. | 2006