Efficient RFID authentication protocols based on pseudorandom sequence generators
Designs, Codes and Cryptography
Universally Composable RFID Identification and Authentication Protocols
ACM Transactions on Information and System Security (TISSEC)
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
An approach for stream ciphers design based on joint computing over random and secret data
Computing - Special Issue on the occasion of the 8th Central European Conference on Cryptography
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes: Volume 23 - D Information and Communication Security
Lightweight broadcast authentication protocols reconsidered
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
More on the Security of Linear RFID Authentication Protocols
Selected Areas in Cryptography
HB#: increasing the security and efficiency of HB+
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Efficient authentication from hard learning problems
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
A novel broadcast encryption based on time-bound cryptographic keys
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Hi-index | 0.00 |