Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC.
Lei WangKazuo OhtaYu SasakiKazuo SakiyamaNoboru KunihiroPublished in: IEICE Trans. Inf. Syst. (2010)
Keyphrases
- real time
- authentication protocol
- secret key
- hash functions
- smart card
- public key
- security analysis
- rfid tags
- signature scheme
- low cost
- lightweight
- secure communication
- key management
- similarity search
- security protocols
- cryptographic protocols
- encryption scheme
- diffie hellman
- ban logic
- security requirements
- information security