A realistic security analysis of identification schemes based on combinatorial problems.
Guillaume PoupardPublished in: Eur. Trans. Telecommun. (1997)
Keyphrases
- combinatorial problems
- security analysis
- constraint programming
- constraint satisfaction
- constraint satisfaction problems
- combinatorial optimization
- metaheuristic
- traveling salesman problem
- public key
- smart card
- security model
- phase transition
- security properties
- high security
- security requirements
- provably secure
- mutual authentication
- global constraints
- authentication protocol
- encryption scheme
- user authentication
- branch and bound algorithm
- neural network
- authentication scheme
- power consumption
- upper bound
- state space