Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices.
Kakali ChatterjeeAsok DeDaya GuptaPublished in: Int. J. Netw. Secur. (2013)
Keyphrases
- mutual authentication
- private key
- rfid tags
- security analysis
- public key
- authentication protocol
- privacy protection
- authentication scheme
- secret key
- key distribution
- encryption algorithm
- trusted third party
- authentication mechanism
- low cost
- rfid systems
- lightweight
- digital signature
- signature scheme
- secret sharing scheme
- mobile devices
- ciphertext
- smart card
- radio frequency identification
- encryption scheme
- security requirements
- cost effective
- embedded systems
- elliptic curve
- power consumption
- security issues