Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol.
Jean-Sébastien CoronPublished in: The New Codebreakers (2016)
Keyphrases
- security analysis
- authentication protocol
- mutual authentication
- security requirements
- security model
- public key
- symmetric key
- smart card
- user authentication
- security properties
- high security
- key exchange
- image encryption
- elliptic curve cryptography
- secure electronic
- authentication scheme
- encryption scheme
- rfid systems
- encryption algorithm
- lightweight
- cryptographic protocols
- digital signature
- blind signature
- access control
- information systems