Author:
Desmedt Yvo,Goutier Claude,Bengio Samy
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. S. Bengio, G. Brassard, Y. Desmedt, C. Goutier. and J-J. Quisquater. Aspects and importance of secure implementations of identification systems. June 1987. Submitted to the Journal of Cryptology.
2. Lect Notes Comput Sci;M. Blum,1985
3. M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. Siam J. Comput., 13(4):850–864, November 1984.
4. D. Chaum. Untraceable electronic mail, return addresses. and digital pseudonyms. Commun. ACM, 24(2):84–88. February 1981.
5. Y. Desmedt. A subliminal-free authentication system and its use for identification. In preparation.
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. RFID Security;Encyclopedia of Cryptography, Security and Privacy;2023-10-11
2. How Distance-Bounding Can Detect Internet Traffic Hijacking;Cryptology and Network Security;2021
3. Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs;Lecture Notes in Computer Science;2021
4. Distance-Bounding, Privacy-Preserving Attribute-Based Credentials;Cryptology and Network Security;2020
5. “Internet of Smart Cards”: A pocket attacks scenario;International Journal of Critical Infrastructure Protection;2019-09