Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
Julien BringerHervé ChabannePublished in: CoRR (2008)
Keyphrases
- low cost
- cryptographic protocols
- security mechanisms
- security protocols
- chosen plaintext
- secure routing
- stream cipher
- trusted computing
- real time
- highly efficient
- countermeasures
- security measures
- cryptographic algorithms
- computer security
- ddos attacks
- security properties
- information leakage
- resource constrained
- security flaws
- remote user authentication scheme
- security issues