A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Noise-tolerant learning, the parity problem, and the statistical query model
Journal of the ACM (JACM)
Cryptanalysis of Two Lightweight RFID Authentication Schemes
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Practical attacks on HB and HB+ protocols
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
The cryptographic power of random selection
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Hidden bits approach for authentication in RFID systems
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Hi-index | 0.00 |
At Pervasive 2008, Cichon, Klonowski, Kutylowski proposed a family of shared-key authentication protocols ($\mathcal CKK$). Small computational and communication cost, together with possibility of efficient hardware implementation makes $\mathcal CKK$ attractive for low-cost devices such as RFID tags. In this paper we present a couple of attacks on $\mathcal CKK$ protocols, both passive and active.