![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks
This paper addresses the problem of making signatures of one domain (an ad-hoc network) available in another domain (the Internet). Universal verifiability is a highly desirable property when signed documents ...
-
Chapter and Conference Paper
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves
Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...
-
Chapter and Conference Paper
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit
Power analysis attack, which was introduced by Kocher et al. in 1999, was known as the most threatening physical attack against low power device such as smart-card. The essential reason that allows an attacker...
-
Chapter and Conference Paper
Ternary Tree Based Group Key Management in Dynamic Peer Networks
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, ...
-
Chapter and Conference Paper
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
Recently, it has been shown that some cryptographic devices, such as smart card, RFID and USB token, are vulnerable to the power attacks if they have no defence against them. With the introduction of new types...
-
Chapter and Conference Paper
Investigations of Power Analysis Attacks and Countermeasures for ARIA
In this paper we investigate implementations of ARIA on an 8-bit smartcard. Our investigation focuses on the resistance against different types of differential power analysis (DPA) attacks. We show that an unp...
-
Chapter and Conference Paper
Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...
-
Chapter and Conference Paper
A New Formal Proof Model for RFID Location Privacy
The privacy and security problems in RFID systems have been extensively studied. However, less research has been done on formal analysis of RFID security. The existing adversarial models proposed in the litera...