搜索结果: 1-15 共查到“Cards”相关记录64条 . 查询时间(0.093 秒)
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards
Privacy anonymous credentials authentication
2019/5/13
Cryptographic anonymous credential schemes allow users to prove their personal attributes, such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their privacy, as ...
Private Function Evaluation with Cards
Card-based protocols RAM machine Branching program
2018/11/20
Card-based protocols allow to evaluate an arbitrary fixed Boolean function ff on a hidden input to obtain a hidden output, without the executer learning anything about either of the two (e.g. Crépeau ...
Forward Secure Signatures on Smart Cards
hash-based signatures forward secure signatures smart cards
2018/11/8
We introduce the forward secure signature scheme XMSS++ and present an implementation for smart cards. It is based on the hash-based signature scheme XMSS. In contrast to the only previous implementat...
The Minimum Number of Cards in Practical Card-based Protocols
Card-based protocols Committed format Boolean AND
2017/9/13
Koch, Walzer and Härtel (ASIACRYPT 2015) showed that five cards suffice for computing AND in finite runtime, albeit using relatively complex and unpractical shuffle operations. In this paper, we ...
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers
Smart Card Implementation Lattice-based Cryptography Post-quantum Cryptography
2016/1/26
Most lattice-based cryptographic schemes which enjoy a security proof
suffer from huge key sizes and heavy computations. This is also true for the simpler
case of identification protocols. Recent pr...
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards
two-factor authentication schemes security-critical applications
2016/1/25
The design of secure and efficient smart-card-based password
authentication schemes remains a challenging problem today despite two
decades of intensive research in the security community, and the c...
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Physical Security Small Embedded Devices COMP128-1 Implementations SIM Cards
2016/1/23
Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget.How...
A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards
Cast-as-intended e-voting Estonian e-voting secure hardware
2016/1/9
We propose a simple cast-as-intended remote e-voting protocol where the security is
based on the use of secure (and trusted) smart cards that incorporate incard numeric keyboards
and LCD displays, a...
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards
Authentication protocol constrained device constrained implementation
2016/1/8
Most lattice-based cryptographic schemes with a security proof suffer from large key
sizes and heavy computations. This is also true for the simpler case of authentication protocols
which are used o...
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards
Attribute-based credentials smart cards privacy
2016/1/7
Attribute-based Credentials (ABCs) allow citizens to prove certain properties
about themselves without necessarily revealing their full identity. Smart cards are an attractive
container for such cre...
Security Analysis of an Authentication Scheme Using Smart Cards
Smart Cards Security Analysis
2016/1/5
In 2010, Sood et al [3] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we improve th...
Card-based Cryptographic Protocols Using a Minimal Number of Cards
Card-based protocols Committed format Boolean AND
2015/12/23
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROCRYPT ’89) devised his famous “five-card trick”, which is a secure two-party AND protocol using five ...
In Cornell’s “CS4830: Introduction to Cryptography” offered Fall 2015, students are asked to devise
a physical secure two-party protocol for computing AND, using 4 cards or fewer. An elegant 5-card
...
Virtual Smart Cards: How to Sign with a Password and a Server
client-side cryptography consumer devices
2015/12/21
An important shortcoming of client-side cryptography on
consumer devices is the poor protection of secret keys. Encrypting the
keys under a human-memorizable password hardly offers any protection
w...
Impact of Restaurant Hygiene Grade Cards on Foodborne-Disease Hospitalizations in Los Angeles County
Foodborne-Disease Hospitalizations Restaurant Hygiene Grade Cards
2015/9/21
Although health departments routinely inspect restaurants to
assess compliance with established hygienic standards, few
data are available on the effectiveness of these efforts in preventing foodb...