As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed against HB ineective. In this paper, we show that passive attacks against HB protocol can still be applicable to NLHB and this protocol does not provide the desired security margin. In our attack, we rst linearize the non-linear part of NLHB to obtain a HB equivalent for NLHB, and then exploit the passive attack techniques proposed for the HB to evaluate the security margin of NLHB. The results show that although NLH...
The limited computational resources available on RFID tags imply a need for specially designed authe...
Abstract—The search for lightweight authentication protocols suitable for low-cost RFID tags constit...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-TrustCom2010) in Hong K...
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of d...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
Abstract. The innovative HB+ protocol of Juels and Weis [10] extends device authentication to low-co...
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-const...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB# to improve on HB+ in terms of transmissio...
International Conference on Information Security and Cryptology (ICISC 2010) in Seoul, Korea.Recentl...
At Crypto 2005, Juels and Weis (building on work of Hopper and Blum) proposed and analyzed two share...
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The c...
The limited computational resources available on RFID tags imply a need for specially designed authe...
The limited computational resources available on RFID tags imply a need for specially designed authe...
Abstract—The search for lightweight authentication protocols suitable for low-cost RFID tags constit...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC-TrustCom2010) in Hong K...
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of d...
Part 7: Security Attacks and Measures (Short Papers)International audienceHB and HB+ are a shared se...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
Abstract. The innovative HB+ protocol of Juels and Weis [10] extends device authentication to low-co...
In 2005, Juels and Weis proposed HB+, a perfectly adapted authentication protocol for resource-const...
Abstract. The strikingly simple HB+ protocol of Juels and Weis [11] has been proposed for the authen...
At EuroCrypt ’08, Gilbert, Robshaw and Seurin proposed HB# to improve on HB+ in terms of transmissio...
International Conference on Information Security and Cryptology (ICISC 2010) in Seoul, Korea.Recentl...
At Crypto 2005, Juels and Weis (building on work of Hopper and Blum) proposed and analyzed two share...
Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The c...
The limited computational resources available on RFID tags imply a need for specially designed authe...
The limited computational resources available on RFID tags imply a need for specially designed authe...
Abstract—The search for lightweight authentication protocols suitable for low-cost RFID tags constit...
Authentication for resource-constrained devices is seen as one of the major challenges in current wi...