搜索结果: 1-15 共查到“军队指挥学 Smart Cards”相关记录27条 . 查询时间(0.046 秒)
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Forward Secure Signatures on Smart Cards
hash-based signatures forward secure signatures smart cards
2018/11/8
We introduce the forward secure signature scheme XMSS++ and present an implementation for smart cards. It is based on the hash-based signature scheme XMSS. In contrast to the only previous implementat...
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Smart Card Implementation Lattice-based Cryptography Post-quantum Cryptography
2016/1/26
Most lattice-based cryptographic schemes which enjoy a security proof
suffer from huge key sizes and heavy computations. This is also true for the simpler
case of identification protocols. Recent pr...
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
two-factor authentication schemes security-critical applications
2016/1/25
The design of secure and efficient smart-card-based password
authentication schemes remains a challenging problem today despite two
decades of intensive research in the security community, and the c...
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Cast-as-intended e-voting Estonian e-voting secure hardware
2016/1/9
We propose a simple cast-as-intended remote e-voting protocol where the security is
based on the use of secure (and trusted) smart cards that incorporate incard numeric keyboards
and LCD displays, a...
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Authentication protocol constrained device constrained implementation
2016/1/8
Most lattice-based cryptographic schemes with a security proof suffer from large key
sizes and heavy computations. This is also true for the simpler case of authentication protocols
which are used o...
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Attribute-based credentials smart cards privacy
2016/1/7
Attribute-based Credentials (ABCs) allow citizens to prove certain properties
about themselves without necessarily revealing their full identity. Smart cards are an attractive
container for such cre...
Security Analysis of an Authentication Scheme Using Smart Cards
Smart Cards Security Analysis
2016/1/5
In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we improve th...
Virtual Smart Cards: How to Sign with a Password and a Server
client-side cryptography consumer devices
2015/12/21
An important shortcoming of client-side cryptography on
consumer devices is the poor protection of secret keys. Encrypting the
keys under a human-memorizable password hardly offers any protection
w...
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks
Authentication Smart Cards
2014/3/6
In this paper, we construct two statistical zero-knowledge authentication protocols for smart cards based on general assumptions. The first protocol can only resist active attacks, where the smart car...
Factoring RSA keys from certified smart cards: Coppersmith in the wild
factorization Coppersmith
2014/3/7
An attacker can efficiently factor at least 184 distinct 1024-bit RSA keys from Taiwan's national "Citizen Digital Certificate" database. The big story here is that these keys were generated by govern...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/6/14
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/3/20
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication
cryptographic protocols / smart cards cryptanalysis key management
2012/3/29
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that this scheme ...
Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards
Biometrics user authentication smart cards security
2012/8/28
Authentication and key exchange are fundamental techniques for enabling secure communication over mobile networks. In order to reduce implementation complexity and achieve computation efficiency, desi...