Author of the publication

Enhancing privacy of recent authentication schemes for low-cost RFID systems.

, , , and . ISC Int. J. Inf. Secur., 7 (2): 135-149 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing privacy of recent authentication schemes for low-cost RFID systems., , , and . ISC Int. J. Inf. Secur., 7 (2): 135-149 (2015)Breaking anonymity of some recent lightweight RFID authentication protocols., , , and . Wirel. Networks, 25 (3): 1235-1252 (2019)Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable., , , and . IACR Cryptol. ePrint Arch., (2023)Two-Round Concurrent 2PC from Sub-Exponential LWE., , , , , and . IACR Cryptol. ePrint Arch., (2022)A Subversion-Resistant SNARK., , , and . ASIACRYPT (3), volume 10626 of Lecture Notes in Computer Science, page 3-33. Springer, (2017)Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs., and . IACR Cryptology ePrint Archive, (2020)Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard., , , and . IST, page 111-116. IEEE, (2016)DL-Extractable UC-Commitment Schemes., , , , and . ACNS, volume 11464 of Lecture Notes in Computer Science, page 385-405. Springer, (2019)On QA-NIZK in the BPK Model., , , and . Public Key Cryptography (1), volume 12110 of Lecture Notes in Computer Science, page 590-620. Springer, (2020)Traceability Analysis of Recent RFID Authentication Protocols., , , and . Wirel. Pers. Commun., 83 (3): 1663-1682 (2015)