Login / Signup
Comment on four two-party authentication protocols.
Yalin Chen
Jue-Sam Chou
Chun-Hui Huang
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
authentication protocol
smart card
public key
lightweight
security analysis
security protocols
secret key
rfid tags
cryptographic protocols
ban logic
key distribution
rfid systems
hash functions