Skip to main content

and
Your search also matched 44 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure

Include preview-only content
  1. Article

    Open Access

    Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing

    Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of ...

    Chunjie Cao, Chao Yang, Jianfeng Ma in EURASIP Journal on Wireless Communications… (2008)

  2. Chapter and Conference Paper

    A New Formal Proof Model for RFID Location Privacy

    The privacy and security problems in RFID systems have been extensively studied. However, less research has been done on formal analysis of RFID security. The existing adversarial models proposed in the litera...

    JungHoon Ha, SangJae Moon, Jianying Zhou, JaeCheol Ha in Computer Security - ESORICS 2008 (2008)

  3. Chapter and Conference Paper

    Low-Cost and Strong-Security RFID Authentication Protocol

    This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a co...

    JeaCheol Ha, SangJae Moon in Emerging Directions in Embedded and Ubiqui… (2007)

  4. Chapter and Conference Paper

    HGLAP – Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System

    This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The proposed protocol is based on a h...

    JeaCheol Ha, HwanKoo Kim, JeaHoon Park in Emerging Directions in Embedded and Ubiqui… (2007)

  5. Chapter and Conference Paper

    Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan

    With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in t...

    **nghua Li, Jianfeng Ma, SangJae Moon in Network and Parallel Computing (2007)

  6. Chapter and Conference Paper

    On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan

    Compared with the original standard, the greatest change that WAPI (Chinese WLAN security standard) implementation plan made lies in the key-agreement protocol in WAI (Wireless Authentication Infrastructure). ...

    **nghua Li, SangJae Moon, Jianfeng Ma in Applied Cryptography and Network Security (2006)

  7. Chapter and Conference Paper

    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves

    Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...

    Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon in Selected Areas in Cryptography (2006)

  8. Chapter and Conference Paper

    Efficient Distributed Signcryption Scheme as Group Signcryption

    The existing distributed signcryption is designed for distributing a signcrypted message to a designated group. However, it does not provide confidentiality of sender ID and its extension to a group signcrypti...

    Dong** Kwak, SangJae Moon in Applied Cryptography and Network Security (2003)