Parallel and concurrent security of the HB and HB+ protocols (2006)

by Jonathan Katz , Ji Sun Shin
Venue:In Proc. Advances in Crypotology (EUROCRYPT 2006) (2006), LNCS
Citations:27 - 0 self

Documents Related by Co-Citation

101 Authenticating Pervasive Devices with Human Protocols – Ari Juels, Stephen A. Weis - 2005
87 Secure human identification protocols – Manuel Blum - 2001
53 An active attack against HB+ – a provable secure lightweight authentication protocol – Henri Gilbert, Matthew Robshaw, Hervé Sibert, Issy Les Moulineaux
83 Cryptographic Primitives Based on Hard Learning Problems – Avrim Blum, Merrick Furst, Michael Kearns, Richard J. Lipton - 1994
197 On Lattices, Learning with Errors, Random Linear Codes, and Cryptography – Oded Regev - 2005
116 Noise-tolerant learning, the parity problem, and the statistical query model – Avrim Blum, Adam Kalai T, Hal Wasserman
26 An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding – Jean-Bernard Fischer, Jacques Stern - 1996
12 Efficient authentication from hard learning problems – Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi, Ru Bochum
53 YA-TRAP: Yet another trivial RFID authentication protocol – G Tsudik - 2006
84 A Lightweight RFID Protocol to Protect Against Traceability and Cloning – T Dimitriou - 2005
33 Lightweight Authentication Protocols for Low-Cost RFID Tags – Istvan Vajda, Levente Buttyán - 2003
11 On the Security of HB # Against a Man-in-the-Middle Attack – Khaled Ouafi, Raphael Overbeck, Serge Vaudenay
6 Formal analysis of crypto protocols: Secrecy types for a simulatable cryptographic library – P LAUD - 2005
15 Initiator-Resilient Universally Composable Key Exchange – Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt - 2003
183 Foundations of Cryptography – O Goldreich - 2007
75 Multiparty Computation with Faulty Majority – Donald Beaver, Sha Goldwasser - 1989
135 Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority – D Beaver - 1991
125 Universally Composable Two-Party and Multi-Party Secure Computation – Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai - 2002
6 Universally composable commitments (extended abstract – Ran Canetti, Marc Fischlin