Authenticated key exchange from ideal lattices

J Zhang, Z Zhang, J Ding, M Snook… - Advances in Cryptology …, 2015 - Springer
In this paper, we present a practical and provably secure two-pass authenticated key
exchange protocol over ideal lattices, which is conceptually simple and has similarities to …

Secure authentication in the grid: A formal analysis of DNP3 SAv5

C Cremers, M Dehnel-Wild… - Journal of Computer …, 2019 - content.iospress.com
Most of the world's power grids are controlled remotely. Their control messages are sent
over potentially insecure channels, driving the need for an authentication mechanism. The …

Security Analysis of BLAKE2's Modes of Operation

A Luykx, B Mennink, S Neves - Cryptology ePrint Archive, 2016 - eprint.iacr.org
BLAKE2 is a hash function introduced at ACNS 2013, which has been adopted in many
constructions and applications. It is a successor to the SHA-3 finalist BLAKE, which received …

[HTML][HTML] “Internet of Smart Cards”: A pocket attacks scenario

L Sportiello - International Journal of Critical Infrastructure Protection, 2019 - Elsevier
Smart cards are secure devices used to store people sensitive data and to regulate
important operations like identity proofs and payment transactions. For years people have …

Contactless access control based on distance bounding

H Kılınç, S Vaudenay - … Security: 20th International Conference, ISC 2017 …, 2017 - Springer
Contactless access control systems are critical for security but often vulnerable to relay
attacks. In this paper, we define an integrated security and privacy model for access control …

Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

JP Degabriele, V Fehr, M Fischlin, T Gagliardoni… - International Journal of …, 2016 - Springer
Abstract The Protocol for Lightweight Authentication of Identity (PLAID) aims at secure and
private authentication between a smart card and a terminal. Originally developed by a unit of …

Algebraic cryptanalysis and RFID authentication

C Cid, L Ferreira, G Procter, MJB Robshaw - … New York, NY, USA, June 23 …, 2015 - Springer
The standardization group ISO/IEC SC31/WG7 is working on a set of cryptographic suites to
provide security to wireless devices including UHF RFID tags. These cryptographic suites …

[PDF][PDF] Component-based security under partial compromise

M Dehnel-Wild - 2018 - ora.ox.ac.uk
In our increasingly connected world, daily life depends on the correct and unimpaired
operation of the computers controlling our infrastructure. These systems are increasingly …

Key exchanges

J Zhang, Z Zhang, J Zhang, Z Zhang - Lattice-Based Cryptosystems: A …, 2020 - Springer
As discussed in Chap. 3, the use of public-key cryptography can avoid the problem of key
distributions that is inherent in the symmetric-key cryptography. But most public-key …

[PDF][PDF] Response to “Nit-Picking PLAID AS & ISO Project Editors Report into 'Unpicking Plaid'”

JP Degabriele, V Fehr, M Fischlin, T Gagliardoni… - 2014 - Citeseer
This is a response to the document “Nit-Picking PLAID AS & ISO Project Editors Report into
'Unpicking Plaid'”[Fre14] on our paper “Unpicking PLAID–A Cryptographic Analysis of an …