Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
On the Reliability of Electronic Payment Systems
IEEE Transactions on Software Engineering
Smart cards: a guide to building and managing smart card applications
Smart cards: a guide to building and managing smart card applications
Password authentication with insecure communication
Communications of the ACM
Smart Cards: Seizing Strategic Business Opportunities
Smart Cards: Seizing Strategic Business Opportunities
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Hi-index | 0.00 |
Two protocols for authentication based on symmetric key. cryptography are described, where the verifier can be implemented in software completely, without, the need for secure storage of any secret information. The protocols use a symmetric cipher in an asymmetric fashion: the verifier uses a verification key, which is derived from a symmetric master key.Software only verification means that the verifier does not have to be equipped with some tamper resistant device storing the verification keys. The protocols are especially suitable for the smart card enrironment where symmetric key protocols are extensively used, and will be used for some time to come, to reduce both system cost and transaction time.