Cryptanalysis of mutual authentication and key exchange for low power wireless communications.
Kyungah ShimPublished in: IEEE Commun. Lett. (2003)
Keyphrases
- low power
- wireless communication
- secret key
- diffie hellman
- security analysis
- low cost
- public key
- high speed
- smart card
- power consumption
- authentication protocol
- wireless networks
- private key
- signature scheme
- key distribution
- rfid tags
- communication networks
- encryption scheme
- computer simulation
- wireless sensor networks
- mobile communication
- key management
- wireless channels
- hash functions
- digital signature
- standard model
- security requirements
- ciphertext
- resource constrained
- distributed databases