Cryptanalysis on Four Two-Party Authentication Protocols
Yalin ChenJue-Sam ChouChun-Hui HuangPublished in: CoRR (2010)
Keyphrases
- authentication protocol
- secret key
- hash functions
- smart card
- public key
- signature scheme
- key distribution
- security analysis
- secure communication
- lightweight
- key management
- rfid tags
- security protocols
- encryption scheme
- ciphertext
- real time
- similarity search
- cryptographic protocols
- security properties
- rfid systems
- data sets