At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB# to improve on HB+ in terms of transmission cost and security against man-in-the-middle attacks. Although the security of HB# is formally proven against a certain class of man- in-the-middle adversaries, it is only conjectured for the general case. In this paper, we present a general man-in-the-middle attack against HB# and Random-HB#, which can also be applied to all anterior HB-like protocols, that recovers the shared secret in 225 or 220 authentication rounds for HB# and 234 or 228 for Random-HB#, depending on the parameter set. We further show that the asymptotic complexity of our attack is polynomial under some conditions on the parameter set which are met on one of those propos...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen asone of the major challenges in current wir...
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-const...
Abstract. The innovative HB+ protocol of Juels and Weis [10] extends device authentication to low-co...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
The HB protocol and its $HB^+$ successor are lightweight authentication schemes based on the Learnin...
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of d...
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-TrustCom2010) in Hong K...
At Crypto 2005, Juels and Weis (building on work of Hopper and Blum) proposed and analyzed two share...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen asone of the major challenges in current wir...
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-const...
Abstract. The innovative HB+ protocol of Juels and Weis [10] extends device authentication to low-co...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
The HB protocol and its $HB^+$ successor are lightweight authentication schemes based on the Learnin...
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of d...
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-TrustCom2010) in Hong K...
At Crypto 2005, Juels and Weis (building on work of Hopper and Blum) proposed and analyzed two share...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen asone of the major challenges in current wir...