When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack (Q1676238): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1515/jmc-2015-0059 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2758634049 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: How Far Can We Go Beyond Linear Cryptanalysis? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4638058 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advanced Lectures on Machine Learning / rank
 
Normal rank
Property / cites work
 
Property / cites work: BehavioCog: An Observation Resistant Authentication Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Can “Something You Know” Be Saved? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elements of Information Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474165 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authenticating Pervasive Devices with Human Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Human Identification Through Insecure Channel / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4092698 / rank
 
Normal rank

Latest revision as of 15:50, 14 July 2024

scientific article
Language Label Description Also known as
English
When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
scientific article

    Statements

    When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack (English)
    0 references
    0 references
    0 references
    6 November 2017
    0 references
    identification protocols
    0 references
    human identification protocols
    0 references
    cryptography
    0 references
    information security
    0 references
    information theory
    0 references

    Identifiers