Cryptanalysis of the m-permutation protection schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secr...
Saved in:
Main Authors: | WU, Hongjun, BAO, Feng, YE, Dingfeng, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2000
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1111 https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Cryptanalysis of Polynomial Authentication and Signature Scheme
by: WU, Hongjun, et al.
Published: (2000) -
Strongly secure certificateless key exchange without pairing
by: YANG, Guomin, et al.
Published: (2011) -
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
by: WU, Hongjun, et al.
Published: (2001) -
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
by: BAO, Feng, et al.
Published: (2005) -
A Lightweight Privacy-preserving Path Selection Scheme in VANETs
by: WANG, Guojun, et al.
Published: (2023)