搜索结果: 1-8 共查到“军队指挥学 Smart Card”相关记录8条 . 查询时间(0.106 秒)
Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card
DES side-channel attack DES key schedule
2017/6/28
Recently, a new template attack on the DES key scheduling was demonstrated that allows recovery of a sufficiently large portion of the DES key of a widely deployed certified smart card chip using a si...
PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD
elliptic curve cryptosystem smart cards hash functions
2017/6/6
Nowadays, IT enabled service gain more attention due to easy to access resources from remote place. IT enabled services are extend their service to all kind of business and personal related applicatio...
Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card
DES TDES Template Attack
2017/2/20
A new template attack on the DES key scheduling is demonstrated that allows recovery of a sufficiently large portion of the DES key of a recent and widely deployed smart card chip with a {\it single} ...
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
side-channel attacks SHA-3
2016/3/1
As the new SHA-3 standard, the security and reliability of Keccak
have attracted a lot of attentions. Previous works already show that both software
and hardware implementations of Keccak have stron...
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics
Key agreement scheme Anonymous multi-server Securty
2016/1/26
Chuang and Chen propose an anonymous multi server authenticated
key agreement scheme based on trust computing using smart
card, password, and biometrics. Chuang and Chen say that this scheme
not on...
AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD
Discrete logarithm problem Fingerprinting Hash functions
2015/12/29
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common sessio...
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card
smart card-based anonymous verify
2014/3/12
Recently, Khan et al. proposed an enhancement on a remote authentication scheme designed by Wang et al. which emphasizes on using dynamic identity. They claim that their improvement can avoid insider ...
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card
Authentication Security Cryptanalysis card Attacks
2010/7/13
The weakness of an exquisite authentication scheme based on smart cards and passwords proposed by Liao et al. [C. H. Liao, H. C. Chen, and C. T. Wang, An Exquisite Mutual Authentication Scheme with Ke...