Pages that link to "Item:Q5451032"
From MaRDI portal
The following pages link to Authenticating Pervasive Devices with Human Protocols (Q5451032):
Displayed 15 items.
- Side-channel resistant crypto for less than 2,300 GE (Q656520) (← links)
- Efficient RFID authentication protocols based on pseudorandom sequence generators (Q1009145) (← links)
- Cryptography with constant input locality (Q1037233) (← links)
- The Cryptographic Power of Random Selection (Q2889867) (← links)
- Cryptography from Learning Parity with Noise (Q2891361) (← links)
- How to Encrypt with the LPN Problem (Q3519542) (← links)
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags (Q3525666) (← links)
- Parallel and Concurrent Security of the HB and HB + Protocols (Q3593090) (← links)
- On the Security of HB# against a Man-in-the-Middle Attack (Q3600368) (← links)
- Good Variants of HB + Are Hard to Find (Q3603007) (← links)
- Code-Based Public-Key Cryptosystems and Their Applications (Q4931667) (← links)
- On Privacy Models for RFID (Q5387093) (← links)
- : Increasing the Security and Efficiency of (Q5458602) (← links)
- Hash Functions and RFID Tags: Mind the Gap (Q5502785) (← links)
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols (Q5962225) (← links)