When are identification protocols with sparse challenges safe? The case of the Coskun and Herley attack
From MaRDI portal
Publication:1676238
DOI10.1515/jmc-2015-0059zbMath1372.94411MaRDI QIDQ1676238
Hassan Jameel Asghar, Mohamed Ali Kaafar
Publication date: 6 November 2017
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2015-0059
cryptography; information theory; identification protocols; information security; human identification protocols
Uses Software