A novel lightweight block cipher-based mutual authentication protocol for constrained environments

C Trinh, B Huynh, J Lansky, S Mildeova… - IEEE …, 2020 - ieeexplore.ieee.org
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …

[引用][C] A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

C Trinh, B Huynh, J Lánský, S Mildeová, M Safkhani… - IEEE Access, 2020 - is.vsfs.cz
In this article we analyze the security of four recent ultra-lightweight/lightweight protocols, by
presenting important attacks including secret disclosure attack and desynchronization attack …

[PDF][PDF] A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

C TRINH, BAO HUYNH, JAN LANSKY, S MILDEOVA… - academia.edu
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …

[引用][C] A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

C Trinh, B Huynh, J Lansky, S Mildeova… - IEEE …, 2020 - ui.adsabs.harvard.edu
A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained
Environments - NASA/ADS Now on home page ads icon ads Enable full ADS view NASA/ADS …

[PDF][PDF] A Novel Lightweight Block Cipher-based Mutual Authentication Protocol for Constrained Environments

C TRINH, BAO HUYNH, JAN LANSKY, S MILDEOVA… - scholar.archive.org
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …

[引用][C] A Novel Lightweight Block Cipher-Based Mutual Authentication Protocol for Constrained Environments

C Trinh, B Huynh, J Lánský, S Mildeová, M Safkhani… - IEEE Access, 2020 - is.vsfs.cz
In this article we analyze the security of four recent ultra-lightweight/lightweight protocols, by
presenting important attacks including secret disclosure attack and desynchronization attack …