Login / Signup
Kleptography in Authentication Protocols: Why is it Still Possible?
Carina Heßeling
Jörg Keller
Sebastian Litzinger
Published in:
EICC (2022)
Keyphrases
</>
authentication protocol
smart card
lightweight
public key
security analysis
rfid tags
security protocols
secret key
cryptographic protocols
hash functions
real time
rfid systems
ban logic