Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure

    A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary greatest common divisor algorithm. The proposed algorithms are inversion free and have the capability to evaluate ...

    Sung-Ming Yen, Chien-Ning Chen, SangJae Moon in Journal of Cryptographic Engineering (2012)

  2. No Access

    Article

    Universally composable one-time signature and broadcast authentication

    Broadcast authentication is a vital security primitive for the management of a copious number of parties. In the universally composable framework, this paper investigates broadcast authentication using one-tim...

    JunWei Zhang, JianFeng Ma, SangJae Moon in Science China Information Sciences (2010)

  3. No Access

    Article

    Universally composable secure TNC model and EAP-TNC protocol in IF-T

    This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality ℱTNC

    JunWei Zhang, JianFeng Ma, SangJae Moon in Science China Information Sciences (2010)

  4. No Access

    Chapter and Conference Paper

    Fuzzy Identity-Based Identification Scheme

    We present a new type of Identity-Based Identification (IBI), namely Fuzzy Identity-Based Identification (FIBI). FIBI is an extension of traditional IBI where the identity (ID) is viewed as a set of values. In FI...

    Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi in U- and E-Service, Science and Technology (2009)

  5. Article

    Open Access

    Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing

    Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of ...

    Chunjie Cao, Chao Yang, Jianfeng Ma in EURASIP Journal on Wireless Communications… (2008)

  6. No Access

    Article

    A new approach for UC security concurrent deniable authentication

    Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider a...

    Tao Feng, FengHua Li, JianFeng Ma in Science in China Series F: Information Sci… (2008)

  7. No Access

    Chapter and Conference Paper

    A Security Enhancement of the E0 Cipher in Bluetooth System

    Summation generator was analyzed by Dawson’s divide-and-conquer- attack[1] and showed us the weakness by Golic’s correlation attack[3] and Meier’s Fast correlation attack[4]. In this paper, We propose a Circul...

    HyeongRag Kim, HoonJae Lee, SangJae Moon in Agent and Multi-Agent Systems: Technologie… (2008)

  8. Chapter and Conference Paper

    A New Formal Proof Model for RFID Location Privacy

    The privacy and security problems in RFID systems have been extensively studied. However, less research has been done on formal analysis of RFID security. The existing adversarial models proposed in the litera...

    JungHoon Ha, SangJae Moon, Jianying Zhou, JaeCheol Ha in Computer Security - ESORICS 2008 (2008)

  9. No Access

    Article

    Universally composable anonymous Hash certification model

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity au...

    Fan Zhang, JianFeng Ma, SangJae Moon in Science in China Series F: Information Sciences (2007)

  10. Chapter and Conference Paper

    Low-Cost and Strong-Security RFID Authentication Protocol

    This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a co...

    JeaCheol Ha, SangJae Moon in Emerging Directions in Embedded and Ubiqui… (2007)

  11. No Access

    Chapter and Conference Paper

    Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP)

    Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP (One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the p...

    JeaCheol Ha, SangJae Moon in Emerging Technologies in Knowledge Discove… (2007)

  12. No Access

    Chapter and Conference Paper

    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit

    Power analysis attack, which was introduced by Kocher et al. in 1999, was known as the most threatening physical attack against low power device such as smart-card. The essential reason that allows an attacker...

    JeaHoon Park, HoonJae Lee, JaeCheol Ha in Computational Intelligence and Security (2007)

  13. No Access

    Article

    Provable efficient certificateless group key exchange protocol

    Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we pr...

    Chunjie Cao, Jianfeng Ma, Sangjae Moon in Wuhan University Journal of Natural Sciences (2007)

  14. No Access

    Chapter and Conference Paper

    Ternary Tree Based Group Key Management in Dynamic Peer Networks

    For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, ...

    Wei Wang, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2007)

  15. No Access

    Chapter and Conference Paper

    Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC

    Recently, it has been shown that some cryptographic devices, such as smart card, RFID and USB token, are vulnerable to the power attacks if they have no defence against them. With the introduction of new types...

    JaeCheol Ha, JeaHoon Park, SangJae Moon, SungMing Yen in Information Security Applications (2007)

  16. No Access

    Chapter and Conference Paper

    LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System

    Despite various solutions to the security problems in an RFID system, most are unable to fully support all the security requirements. Plus, when designing a viable RFID system, account should also be taken of ...

    JeaCheol Ha, JungHoon Ha, SangJae Moon, Colin Boyd in Ubiquitous Convergence Technology (2007)

  17. Chapter and Conference Paper

    HGLAP – Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System

    This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The proposed protocol is based on a h...

    JeaCheol Ha, HwanKoo Kim, JeaHoon Park in Emerging Directions in Embedded and Ubiqui… (2007)

  18. No Access

    Chapter and Conference Paper

    Investigations of Power Analysis Attacks and Countermeasures for ARIA

    In this paper we investigate implementations of ARIA on an 8-bit smartcard. Our investigation focuses on the resistance against different types of differential power analysis (DPA) attacks. We show that an unp...

    HyungSo Yoo, Christoph Herbst, Stefan Mangard in Information Security Applications (2007)

  19. Chapter and Conference Paper

    Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan

    With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in t...

    **nghua Li, Jianfeng Ma, SangJae Moon in Network and Parallel Computing (2007)

  20. No Access

    Chapter and Conference Paper

    Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Sangjae Moon in Information Systems Security (2007)

previous disabled Page of 3