Login / Signup
Cryptanalysis of an authentication scheme using truncated polynomials.
Markus Grassl
Rainer Steinwandt
Published in:
Inf. Process. Lett. (2009)
Keyphrases
</>
authentication scheme
secret key
smart card
image encryption
public key
hash functions
security flaws
user authentication
key management
signature scheme
image authentication
authentication protocol
ciphertext
security analysis
encryption scheme
real time
tampering detection
rfid tags
operating system