The HB protocol and its $HB^+$ successor are lightweight authentication schemes based on the Learning Parity with Noise (LPN) problem. They both suffer from the so-called GRS-attack whereby a man-in-the-middle (MiM) adversary can recover the secret key. At WiSec 2015, Pagnin et al. proposed the $HB+DB$ protocol: $HB^+$ with an additional distance-bounding dimension added to detect and counteract such MiM attacks. They showed experimentally that $HB+DB$ was resistant to GRS adversaries, and also advanced $HB+DB$ as a distance-bounding protocol, discussing its resistance to worst-case distance-bounding attackers. In this paper, we exhibit flaws both in the authentication and distance-bounding layers of $HB+DB$; these vulnerabilities encompas...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a veri...
International audienceTerrorist fraud is a class of relay attacks against distance-bounding (DB) pro...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
HB+ is a lightweight authentication scheme, which is secure against passive attacks if the Learning ...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen asone of the major challenges in current wir...
At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB# to improve on HB+ in terms of transmissio...
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-const...
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study o...
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. Recently,...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a veri...
International audienceTerrorist fraud is a class of relay attacks against distance-bounding (DB) pro...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
International audienceThe HB protocol and its HB + successor are lightweight authentication schemes ...
HB+ is a lightweight authentication scheme, which is secure against passive attacks if the Learning ...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
Authentication for resource-constrained devices is seen asone of the major challenges in current wir...
At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB# to improve on HB+ in terms of transmissio...
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-const...
Distance Bounding (DB) is designed to mitigate relay attacks. This paper provides a complete study o...
Distance-bounding protocols prevent man-in-the-middle attacks by measuring response times. Recently,...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
A distance bounding (DB) protocol is a two-party authentication protocol between a prover and a veri...
International audienceTerrorist fraud is a class of relay attacks against distance-bounding (DB) pro...