搜索结果: 1-14 共查到“军队指挥学 HB”相关记录14条 . 查询时间(0.109 秒)
The HB protocol and its HB+HB+ successor are lightweight authentication schemes based on the Learning Parity with Noise (LPN) problem. They both suffer from the so-called GRS-attack whereby a man-in-t...
hHB: a Harder HB+ Protocol
RFID Authentication LPN
2016/1/8
In 2005, Juels and Weis proposed HB+
, a perfectly adapted authentication protocol
for resource-constrained devices such as RFID tags. The HB+ protocol is based
on the Learning Parity with Noise (L...
$HB^N$: An HB-like protocol secure against man-in-the-middle attacks
cryptographic protocols authentication secret-key cryptography
2011/7/25
We construct a simple authentication protocol whose security is based solely on the problem of Learning Parity with Noise (LPN) which is secure against Man-in-the-Middle attacks.
A Fault Analytic Method against HB+
Fault analysis authentication protocols HB+ protocol RFID systems
2010/10/11
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem...
Secure and Efficient HB-CM Entity Authentication Protocol
HB-CM Entity Authentication Protocol HB-CM− protocol GRS attack
2009/9/27
The simple, computationally efficient LPN-based HB-like entity
authentication protocols have attracted a great deal of attention in
the past few years due to the broad application prospect in low-co...
Secure and Efficient HB-CM Entity Authentication Protocol
Secure Efficient HB-CM Entity Authentication Protocol
2009/9/22
The simple, computationally efficient LPN-based HB-like entity
authentication protocols have attracted a great deal of attention in
the past few years due to the broad application prospect in low-co...
With increased use of passive RFID tags, the need for secure lightweight identification protocols
arose. HB+ is one such protocol, which was proven secure in the detection-based model, but shown
bre...
HB and HB+ are a shared-key authentication protocol designed for
low-cost devices such as RFID tags. It was proposed by Juels andWeis at Crypto
2005. The security of the protocol relies on the “lear...
A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Novel Probabilistic Passive Attack HB HB+
2009/6/5
We present a very simple probabilistic, passive attack against the protocols HB and HB+.
Our attack presents some interesting features: it requires less captured transcripts of protocol
executions w...
Trusted–HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks
RFID HB+ protocol Low-cost cryptography Authentication
2009/6/2
Since the introduction at Crypto’05 by Juels and
Weis of the protocol HB+, a lightweight protocol secure against
active attacks but only in a detection based-model, many works
have tried to enhance...
The innovative HB+ protocol of Juels and Weis [10] extends
device authentication to low-cost RFID tags. However, despite the very
simple on-tag computation there remain some practical problems with
...
Parallel and Concurrent Security of the HB and HB+ Protocols
Parallel Concurrent Security HB and HB+ Protocols
2009/3/19
Juels and Weis (building on prior work of Hopper and Blum) propose and analyze two
shared-key authentication protocols - HB and HB+ -whose extremely low computational
cost makes them attractive for ...
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
RFID privacy low-cost cryptography
2009/2/19
Much research has focused on providing RFID tags with lightweight cryptographic
functionality. The HB+ authentication protocol was recently proposed [1]
and claimed to be secure against both passive...
Analyzing the HB and HB+ Protocols in the “Large Error” Case
HB HB+ Protocols Large Error Case
2008/12/19
HB and HB+ are two shared-key, unidirectional authentication protocols whose extremely
low computational cost makes them potentially well-suited for severely resource-constrained
devices. Security o...