Login / Signup

Kleptography in Authentication Protocols: Why is it Still Possible?

Carina HeßelingJörg KellerSebastian Litzinger
Published in: EICC (2022)
Keyphrases
  • authentication protocol
  • smart card
  • lightweight
  • public key
  • security analysis
  • rfid tags
  • security protocols
  • secret key
  • cryptographic protocols
  • hash functions
  • real time
  • rfid systems
  • ban logic