نتایج جستجو برای: identification key

تعداد نتایج: 936593  

Journal: :CoRR 2011
Paul E. Gunnells

The Algebraic Eraser (AE) is a cryptographic primitive that can be used to obscure information in certain algebraic cryptosystems. The Colored Burau Key Agreement Protocol (CBKAP), which is built on the AE, was introduced by I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux [1] in 2006 as a protocol suitable for use on platforms with constrained computational resources, such as RFID and wireles...

Journal: :IACR Cryptology ePrint Archive 2017
Xavier Bultel Pascal Lafourcade

Zero-knowledge proxy re-identification (ZK-PRI) has been introduced by Blaze et al. in 1998 together with two other well known primitives of recryptography, namely proxy re-encryption (PRE) and proxy re-signature (PRS). A ZK-PRI allows a proxy to transform an identification protocol for Alice into an identification protocol for Bob using a re-proof key. PRE and PRS have been largely studied in ...

Journal: :CoRR 2007
M. M. Chowdhury

Recently the AAGL (Anshel-Anshel-Goldfeld-Lemieux) has been proposed which can be used for RFID tags. We give algorithms for the problem (we call the MSCSPv) on which the security of the AAGL protocol is based upon. Hence we give various attacks for general parameters on the recent AAGL protocol proposed. One of our attack is a deterministic algorithmwhich has space complexity and time complexi...

Journal: :IACR Cryptology ePrint Archive 2014
Imran Erguler

One of the interesting types of RFID application is RFID searching which aims to hear a specific RFID tag from a large group of tags, i.e. ability of detecting whether a target RFID tag is nearby. Very recently, a lightweight protocol using error-correcting codes has been proposed by Chen et al. to provide a solution to needs in this field. The authors give a detailed analysis of their protocol...

2009
Khaled Ouafi Serge Vaudenay

At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol, which we call SQUASH-0, was using a linear mixing function which was subsequently withdrawn. Essentially, we mount an attack against SQUASH-0 with full window which could be used as a “known random coins attack” aga...

Journal: :Journal of Computer Security 2011
Rishab Nithyanand Gene Tsudik Ersin Uzun

Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checkin...

2004
J. Manuel HERRERO Xavier BLASCO J. Vicente SALCEDO César RAMOS

In this article, a procedure for characterizing the feasible parameter set of nonlinear models with a membershipset uncertainty description is provided. A specific Genetic Algorithm denominated ε-GA has been developed, based on Evolutionary Algorithm for Multiobjective Optimization, to find the global minima of the multimodal functions appeared when the robust identification problem is formulat...

Journal: :Annals of Anatomy - Anatomischer Anzeiger 2018

Journal: :Attention, Perception, & Psychophysics 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید