Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Fuzzy Identity-Based Identification Scheme

    We present a new type of Identity-Based Identification (IBI), namely Fuzzy Identity-Based Identification (FIBI). FIBI is an extension of traditional IBI where the identity (ID) is viewed as a set of values. In FI...

    Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi in U- and E-Service, Science and Technology (2009)

  2. No Access

    Chapter and Conference Paper

    A Security Enhancement of the E0 Cipher in Bluetooth System

    Summation generator was analyzed by Dawson’s divide-and-conquer- attack[1] and showed us the weakness by Golic’s correlation attack[3] and Meier’s Fast correlation attack[4]. In this paper, We propose a Circul...

    HyeongRag Kim, HoonJae Lee, SangJae Moon in Agent and Multi-Agent Systems: Technologie… (2008)

  3. Chapter and Conference Paper

    A New Formal Proof Model for RFID Location Privacy

    The privacy and security problems in RFID systems have been extensively studied. However, less research has been done on formal analysis of RFID security. The existing adversarial models proposed in the litera...

    JungHoon Ha, SangJae Moon, Jianying Zhou, JaeCheol Ha in Computer Security - ESORICS 2008 (2008)

  4. Chapter and Conference Paper

    Low-Cost and Strong-Security RFID Authentication Protocol

    This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a co...

    JeaCheol Ha, SangJae Moon in Emerging Directions in Embedded and Ubiqui… (2007)

  5. No Access

    Chapter and Conference Paper

    Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP)

    Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP (One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the p...

    JeaCheol Ha, SangJae Moon in Emerging Technologies in Knowledge Discove… (2007)

  6. No Access

    Chapter and Conference Paper

    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit

    Power analysis attack, which was introduced by Kocher et al. in 1999, was known as the most threatening physical attack against low power device such as smart-card. The essential reason that allows an attacker...

    JeaHoon Park, HoonJae Lee, JaeCheol Ha in Computational Intelligence and Security (2007)

  7. No Access

    Chapter and Conference Paper

    Ternary Tree Based Group Key Management in Dynamic Peer Networks

    For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, ...

    Wei Wang, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2007)

  8. No Access

    Chapter and Conference Paper

    Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC

    Recently, it has been shown that some cryptographic devices, such as smart card, RFID and USB token, are vulnerable to the power attacks if they have no defence against them. With the introduction of new types...

    JaeCheol Ha, JeaHoon Park, SangJae Moon, SungMing Yen in Information Security Applications (2007)

  9. No Access

    Chapter and Conference Paper

    LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System

    Despite various solutions to the security problems in an RFID system, most are unable to fully support all the security requirements. Plus, when designing a viable RFID system, account should also be taken of ...

    JeaCheol Ha, JungHoon Ha, SangJae Moon, Colin Boyd in Ubiquitous Convergence Technology (2007)

  10. Chapter and Conference Paper

    HGLAP – Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System

    This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The proposed protocol is based on a h...

    JeaCheol Ha, HwanKoo Kim, JeaHoon Park in Emerging Directions in Embedded and Ubiqui… (2007)

  11. No Access

    Chapter and Conference Paper

    Investigations of Power Analysis Attacks and Countermeasures for ARIA

    In this paper we investigate implementations of ARIA on an 8-bit smartcard. Our investigation focuses on the resistance against different types of differential power analysis (DPA) attacks. We show that an unp...

    HyungSo Yoo, Christoph Herbst, Stefan Mangard in Information Security Applications (2007)

  12. Chapter and Conference Paper

    Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan

    With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in t...

    **nghua Li, Jianfeng Ma, SangJae Moon in Network and Parallel Computing (2007)

  13. No Access

    Chapter and Conference Paper

    Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Sangjae Moon in Information Systems Security (2007)

  14. Chapter and Conference Paper

    On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan

    Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). ...

    **nghua Li, SangJae Moon, Jianfeng Ma in Applied Cryptography and Network Security (2006)

  15. No Access

    Chapter and Conference Paper

    Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks

    This paper considers the global communication environment of B3G wireless networks when integrating security mechanism of two wireless networks, WLAN and 3G cellular networks. As a result, the existing integra...

    JongMin Jeong, GooYeon Lee, SangJae Moon in Computer and Information Sciences – ISCIS 2006 (2006)

  16. No Access

    Chapter and Conference Paper

    Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection

    The technique of RSA private computation speedup by using Chinese Remainder Theorem (CRT) is well known and has already been widely employed in almost all RSA implementations. A recent CRT-based factorization ...

    Sung-Ming Yen, Dongryeol Kim, SangJae Moon in Fault Diagnosis and Tolerance in Cryptography (2006)

  17. No Access

    Chapter and Conference Paper

    Relative Doubling Attack Against Montgomery Ladder

    Highly regular execution and the cleverly included redundant computation make the square-multiply-always exponentiation algorithm well known as a good countermeasure against the conventional simple power analy...

    Sung-Ming Yen, Lee-Chun Ko, SangJae Moon in Information Security and Cryptology - ICIS… (2006)

  18. No Access

    Chapter and Conference Paper

    How to Generate Universally Verifiable Signatures in Ad-Hoc Networks

    This paper addresses the problem of making signatures of one domain (an ad-hoc network) available in another domain (the Internet). Universal verifiability is a highly desirable property when signed documents ...

    KyungKeun Lee, JoongHyo Oh, SangJae Moon in Secure Mobile Ad-hoc Networks and Sensors (2006)

  19. Chapter and Conference Paper

    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves

    Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...

    Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon in Selected Areas in Cryptography (2006)

  20. No Access

    Chapter and Conference Paper

    On the Security of the Canetti-Krawczyk Model

    The Canetti-Krawczyk (CK) model is a formal method to design and analyze of key agreement protocols, and these protocols should have some desirable security attributes. In this paper, the relationship between ...

    **nghua Li, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2005)

previous disabled Page of 3