On the Security of HB# against a Man-in-the-Middle Attack
From MaRDI portal
Publication:3600368
DOI10.1007/978-3-540-89255-7_8zbMath1206.94084OpenAlexW1884658981MaRDI QIDQ3600368
Serge Vaudenay, R. Overbeck, Khaled Ouafi
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_8
Related Items (4)
The Cryptographic Power of Random Selection ⋮ Efficient authentication from hard learning problems ⋮ Two-Round Man-in-the-Middle Security from LPN ⋮ A protocol for provably secure authentication of a tiny entity to a high performance computing one
Uses Software
Cites Work
- Unnamed Item
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- An Improved LPN Algorithm
- Parallel and Concurrent Security of the HB and HB + Protocols
- Good Variants of HB + Are Hard to Find
- Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
- On the inherent intractability of certain coding problems (Corresp.)
- Authenticating Pervasive Devices with Human Protocols
- : Increasing the Security and Efficiency of
This page was built for publication: On the Security of HB# against a Man-in-the-Middle Attack